KEMBAR78
Library Automation & Digitization | PDF | World Wide Web | Internet & Web
0% found this document useful (0 votes)
160 views178 pages

Library Automation & Digitization

This document is an e-book designed to assist candidates preparing for the UGC-NET/SLET exams in Library and Information Science, based on the new syllabus effective from June 2019. It includes multiple-choice questions (MCQs) covering topics in computer technology, library automation, and digitization, along with assertion-reasoning questions and detailed notes. The e-book aims to help professionals qualify for competitive examinations and improve their job prospects in the field of library science.

Uploaded by

singh07.priti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
160 views178 pages

Library Automation & Digitization

This document is an e-book designed to assist candidates preparing for the UGC-NET/SLET exams in Library and Information Science, based on the new syllabus effective from June 2019. It includes multiple-choice questions (MCQs) covering topics in computer technology, library automation, and digitization, along with assertion-reasoning questions and detailed notes. The e-book aims to help professionals qualify for competitive examinations and improve their job prospects in the field of library science.

Uploaded by

singh07.priti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 178

BASED ON THE UGC-NET NEW SYLLABUS

JUNE 2019

UGC-NET/SLET MCQs
Library & Information Science
Library Info

Library Info
With Assertion & Reason Questions,
Notes & Descriptions
Revised

UNIT-VII & VIII Ed. 2021

COMPUTER TECHNOLOGY:
LIBRARY AUTOMATION &
DIGITIZATION

BY AQUIL AHMED
Content
Preface ii
New Syllabus for UGC-NET Library & Information Science iii-vii
UNIT – VII (Computer Technology) 1-75
Library Info

Library Info
Computer Fundamentals & Libraries 1-8
Computer Hardware & Devices 8-14
Computer Software & Applications 14-21
Programming Languages 21-27
Telecommunication Fundamentals 21-36
Computer Networks Fundamentals 36-47
Internet – Standards & Protocols 48-62
Multimedia Technology Fundamentals 62-67
Data & Network Security 67-69
Assertion & Reasoning 70-75

UNIT-VIII

UNIT – VIII (Library Automation & Digitization) 76-169


Library Automation 76-91
Barcode & RFID 91-96
Search Engine/Discovery System 96-107
Digitization and Digital Library 107-122
Digital Preservation 122-128
Institutional Repository 129-130
Content Management Systems 130-137
Cloud Computing, Social & Semantic Web 137-159
Big Data & Data Mining 159-162
Assertion & Reasoning 163-169
Preface

National Eligibility Test (NET) of UGC or State Eligibility Test (SET) has become compulsory to get
employment in Universities and Colleges in India. In order to help aspiring professionals to appear for
this exam, I have prepared this E-book containing probable important MCQs based on the new UGC
/NTA–NET Syllabus for June 2019 onwards.
Library Info

Library Info
The present e-book contains MCQs based on the UNIT-VII & VIII of UGC-NET new syllabus along with
about 50 Assertion & Reason Verbal Reasoning questions, detailed and necessary notes and descriptions.

It is hoped that the e-book will serve a useful purpose and help a vast number of LIS professionals to
qualify NET/SLET and other competitive examinations in order to get better job opportunities and
become a qualified library professionals.

- Editor
NEW SYLLABUS FOR NTA UGC NET LIBRARY AND
INFORMATION SCIENCE EXAM 2019

The UGC has revised the pattern and scheme of exam from December 2018. The pattern of exam has
been changed from 3 papers (Paper I, II & III) to 2 papers (Paper I & II). Now, there are 50 MCQs in
Paper 1 and 100 MCQs in Paper 2. Each question carries 2 marks without any NEGATIVE marking
Library Info

Library Info
for wrong answer.

According to NEW SYLLABUS (June 2019 onwards) and new pattern (since December 2018), the exam
would be computer based (Online Mode). The Paper 2 will have 100 Multiple Choice Questions (MCQs)
based on the chosen subject. The objective type questions will include multiple choices, matching type,
true/false and assertion-reasoning type etc.

The New Syllabus of Library and Information Science for UGC NET Exam June 2019
onward will be as follows:
Unit – I
1. Data, Information, Knowledge and Wisdom.
2. Information Life Cycle – Generation, Collection, Storage and Dissemination.
3. Role of Information in Planning, Management, Socio-economic, Cultural, Educational and
Technological Development.
4. Information Science – Relationship with other subjects, Information Society and Knowledge Society.
5. Communication – Concept, Types, Theories, Models, Channels and Barriers; Trends in Scholarly
Communication.
6. Information Industry – Generators, Providers and Intermediaries.
7. IPR and Legal Issues – Categories, Conventions, Treaties, Laws.
8. Plagiarism: Concept and Types.
9. Right to Information Act (RTI); Information Technology Act.
10. National Knowledge Commission; National Mission on Libraries.

Unit – II
1. Historical Development of Libraries in India; Committees and Commissions on Libraries in India.
2. Types of Libraries – Academic, Public, Special and National.
3. Library Legislation and Library Acts in Indian States; The Press and Registration of Books Act; The
Delivery of Books and Newspapers (Public Libraries) Act.
4. Laws of Library Science.
5. Library and Information Science Profession – Librarianship as a Profession, Professional Skills and
Competences; Professional Ethics.
6. Professional Associations – National – ILA, IASLIC, IATLIS; International – IFLA, ALA, CILIP,
ASLIB, SLA; Role of UGC, RRRLF and UNESCO in Promotion and Development of Libraries.
7. Library and Information Science Education in India.
8. Library Public Relations and Extension Activities.
9. Type of Users – User Studies, User Education.
10. Information Literacy – Areas, Standards, Types and Models; Trends in Information Literacy.

Unit – III
Library Info

Library Info
1. Information Sources – Nature, Characteristics, Types and Formats.
2. Sources of Information – Primary, Secondary and Tertiary; Documentary and Non-Documentary.
3. Primary Information Sources (Print and Electronic) – Journals, Conference Proceedings, Patents,
Standards, Theses & Dissertations, Trade Literature.
4. Secondary Information Sources (Print and Electronic) – Dictionaries, Encyclopedias, Bibliographies,
Indexing & Abstracting, Statistical sources, Handbooks and Manuals.
5. Tertiary Information Sources (Print and Electronic)- Directories, Year Books, Almanacs.
6. Reference Sources – Bibliographical, Biographical, Educational, Language and Geographical.
7. Electronic Information Resources – Subject Gateways, Web Portals, Bulletin Boards, Discussion
Forums /Groups.
8. Databases: Bibliographic, Numeric, Full text, Multimedia; Open Access Databases.
9. Institutional and Human Resources.
10. Evaluation of Reference Sources and Web Resources.

Unit – IV
1. Community Information Services.
2. Reference Service – Concept and Types; Referral Services
3. Alerting Services – CAS, SDI, Inter Library Loan and Document Delivery.
4. Mobile based Library Services and Tools – Mobile OPAC, Mobile Databases, Mobile Library Website,
Library Apps, Mobile Library Instructions, Augmented Reality, SMS Alerts, Geo-Location, Reference
Enquiry.
5. Web 2.0 and 3.0 – Library 2.0- Concept, Characteristics, Components; Instant Messaging, RSS Feeds,
Podcasts, Vodcasts, Ask a Librarian
6. Collaborative Services- Social Networks, Academics Social Networks, Social Tagging, Social
Bookmarking.
7. Web – Scale Discovery Services
8. National Information Systems and Networks: NISCAIR, DESIDOC, SENDOC, ENVIS, INFLIBNET,
DELNET, NICNET, ERNET, National Knowledge Network (NKN), Biotechnology Information
System Network
9. International Information Systems and Networks: INIS, AGRIS, INSPEC, MEDLARS, BIOSIS, ERIC,
Patent Information System (PIS), Biotechnology Information System (BIS).
10. Library Resource Sharing and Library Consortia – National and International.

Unit – V
1. Universe of Knowledge – Nature and Attributes; Modes of Formation of Subjects.
2. Knowledge Organisation – Classification – Theories, Cannons, and Principles; Simple Knowledge
Organisation System (SKOS), Taxonomies, Folksonomy, Trends in Classification.
3. Mapping of Subjects in Library Classification Schemes – DDC, UDC and CC.
4. Knowledge Organisation: Cataloguing – Cannons and Principles; Centralized and Co-operative
Catalogue; Library Cataloguing Codes: CCC and AACR – II.
5. Standards of Bibliographic Record Formats and Description – ISBD, MARC 21, CCF, RDA, FRBR,
Bibframe.
6. Standards for Bibliographic Information Interchange & Communication – ISO 2709, Z39.50, Z39.71.
Library Info

Library Info
7. Metadata Standards: Dublin Core; MARC21, METS, MODES, EAD.
8. Indexing Systems and Techniques: Assigned – Pre-coordinate; Post-Coordinate; Derived- Title-based;
Vocabulary Control.
9. Abstracting – Types and Guidelines.
10. Information Retrieval System – Features, Components, Models and Evaluation.

Unit – VI
1. Management – Principles, Functions and Schools of thought.
2. Library and Information Centers Management – Book Selection Tools and Principles; Library
Acquisition, Technical Processing, Circulation, Serial Control, Maintenance and Stock Verification;
Preservation and Conservation; Hazards and Control Measures of Library Materials.
3. Human Resource Management – Planning, Job Analysis, Job Description, Job Evaluation, Selection,
Recruitment, Motivation, Training and Development, Performance Appraisal; Staff Manual.
4. Financial Management in Libraries – Sources of Finance, Resource Mobilization, Budgeting Methods;
Cost Effective and Cost Benefit Analysis, Annual Reports & Statistics; Library Authority and
Committee.
5. Project Management – SWOT, PEST, PERT / CPM.
6. Total Quality Management (TQM) – Concepts, Principles and Techniques, Six Sigma; Evaluation of
Services of Libraries and Information Centers.
7. Library Building, Furniture and Equipments; Green Library Building; Information Commons; Makers
Space; Security and Safety.
8. Management Information System (MIS), MBO, Change Management, Disaster Management, Crisis
Management.
9. Knowledge Management – Principles, Tools, Components and Architecture.
10. Marketing of Library Products and Services – Plan, Research, Strategies, Mix, Segmentation, Pricing
and Advertising; Management Consultancy.

Unit – VII
1. Computer Technology – Character Representation (ASCII, ISCII, Unicode); Computer Hardware,
Software; Storage Devices; Input and Output Devices.
2. Types of Software – System Software, Application Software.
3. Programming Languages – Object Oriented, Procedural, High Level, Scripting; Web Languages.
4. Telecommunication – Transmission Channels, Mode, and Media, ISDN, PSDN, Multiplexing,
Modulation, Standards and Protocols.
5. Wireless Communication – Media, Wi-fi, Li-fi, Satellite Communication, Mobile Communication.
6. Computer Networks – Topologies, Types of Networks – LAN, MAN, WAN.
7. Internet – Web browsers, WWW, E-mail; Search Engines, Meta and Entity Search engines.
8. Internet Protocols and Standards – HTTP, SHTTP, FTP, SMTP, TCP/IP, URI, URL.
9. Hypertext, Hypermedia, Multimedia, Video conferencing, Virtual Reality, Augmented Technologies.
10. Data Security, Network Security, Firewalls, Cryptographic Techniques, Anti-virus software, Anti-
spyware, Intrusion Detection System.
Library Info

Library Info
Unit – VIII
1. Library Automation – Areas, Planning, Selection of Hardware and Software, Implementation and
Evaluation; Standards for Library Automation.
2. Barcode, RFID, QR Code, Biometric, Smartcard: Features and Applications.
3. Digitization – Planning, Selection of Materials, Hardware, Software, Process, Issues.
4. Digital Library: Genesis, Characteristics, Types, Architecture; Standards, Formats and Protocols, DOI.
5. Digital Preservation – Need, Purpose, Standards, Methods, Techniques, Projects (National and
International).
6. Digital Library Initiatives – National and International.
7. Institutional Repositories – Need, Purpose, Types and Tools; Institutional Repositories in India;
ROAR, DOAR, SHARPA-ROMIO.
8. Content Management Systems – Architecture, Data Integration, CMS Software – Selection,
Implementation and Evaluation.
9. Application of Artificial Intelligence, Expert Systems and Robotics in Libraries; Social Mobile
Analytics Cloud (SMAC); Cloud Computing.
10. Ontology – Tools (RDF, RDFS, Potege); Semantic Web, Linked Data, Big Data, Data Mining, Data
Harvesting.

Unit – IX
1. Research – Concept, Purpose, Functions, Scope and Ethics; Types of Research – Basic and Applied,
Interdisciplinary and Multidisciplinary.
2. Research Methods: Historical, Descriptive, Experimental and Delphi.
3. Research Design – Selection of Research Problem, Review of Literature; Formulation of Research
Problem; Hypothesis – Formulation, Types and Testing; Sampling Techniques.
4. Methods of Data Collection: Questionnaire, Interview, Observation, Library Records, Scales and
Checklist.
5. Data Analysis and Interpretation – Presentation of Data; Statistical Methods/ Techniques.
6. Statistical Packages – Spreadsheet, SPSS, Bibexcel, ‘R’ Statistics.
7. Research Report Writing and Citation Tools – Structure, Style, Contents, Guidelines; Style Manuals;
Online Citation Tools; Reference Style Management Tools; Anti-plagiarism Tools; Evaluation of
Research Report.
8. Metric Studies in LIS – Bibliometrics, Scientometric, Webometrics, Altmetrics;
9. Impact Factors – Journal, Institutional and Authors; h-Index, g-Index, i10 Index.
10. Trends in Library and Information Science Research.
Unit –X
1. Academic Library and Information System.
2. Public Library and Information System.
3. Special Library and Information System.
4. Health Science Library and Information System.
Library Info

Library Info
5. Corporate Library and Information System.
6. Agricultural Library and Information System.
7. Engineering and Technological Library and Information System.
8. Archive, Museums and Oriental Libraries.
9. Community Information System.
10. Information Services and System for Persons with Disability, Children and Women.
Computer
C Technology: Library Automation & Digitization Unit -VII

Computer Fundamentals and Libraries Notes: Charles Babbage was considered to be the father
of computing after his concept, and then later the
1. The term ‘Computer’ is derived from __. invention of the Analytical Engine in 1837.
A. German
B. Latin 5. The operation of digital computer is based on
C. French __.
D. Arabic A. Counting principles
B. Measuring principles
Library Info

Library Info
Answer: The term 'computer' is derived from Latin word C. Both of the above
“Computare” which means to “to calculate” , “to count”, D. None of the above
“to sum up” or “to think together”. Hence, more
precisely the word computer means a "device that Answer: A (Counting principles)
performs computation".
Notes: The operation of a digital computer is based on
2. Who was the inventor of ‘Difference Engine’? counting principles. Digital computer used to process
A. Charles Babbage information with quantities using digits, usually the
B. Agusta Adaming binary number system.
C. Allen Turing
6. Which type of computers is most suitable for use
D. None of the Above
in the libraries?
Answer: A (Charles Babbage) A. Analog
B. Super
3. Who designed ‘Analytical Engine’? C. Digital
A. Gottfried D. Hybrid
B. Pascal
C. James Watt Answer: C (Digital)
D. Charles Babbage
Notes: A computer that performs calculations and
Answer: D (Charles Babbage) logical operations with quantities represented as digits,
usually in the binary number system. It is a
Notes: The Analytical Engine was a proposed programmable electronic device that processes numbers
mechanical general-purpose computer designed by and words accurately and at enormous speed. In world
English mathematician and computer pioneer Charles today, most of the computers are digital computers.
Babbage. It was first described in 1837 as the successor
to Babbage's difference engine, which was a design for a 7. Which of the following controls the process of
simpler mechanical computer. interaction between the user and the operating
system?
4. Who is considered as the father of computer? A. User interface
A. Allen Turing B. Platform
B. Charles Babbage C. Language translation
C. Simur Cray D. Screen saver
D. Agusta Adaming
Answer: A (User Interface)
Answer: B (Charles Babbage)
8. User friendly interface caters to __.
a) Human-computer interaction
b) Individual users with customization

1 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

c) Simplify execution of operation constraints, and possibilities. Norbert Wiener defined


d) Basis for computer-computer interface cybernetics in Cybernetics: Or Control and
A. a and b are correct Communication in the Animal and the Machine in 1948
B. c and d are correct as "the scientific study of control and communication in
C. b and d are correct the animal and the machine." In other words, it is the
D. a and c are correct scientific study of how humans, animals and machines
control and communicate with each other.
Answer: D
Library Info

Library Info
12. Ability to read, write and interact across a range
9. The capacity of computer of performing of platforms, tools and media is called ___.
repetitive task without getting tired is called __. A. Digital literacy
A. Versatile B. Information literacy
B. Diligence C. Trans literacy
C. Tolerance D. Micro literacy
D. Maturity
Answer: C (Trans literacy)
Answer: B (Diligence)
Notes: Transliteracy is the ability to read, write and
Notes: The capacity of computer of performing interact across a range of platforms, tools and media
repetitive task without getting tired is called diligence. from signing and orality through handwriting, print, TV,
Computer is called diligent machine because it can radio and film, to digital social networks.
perform the task repeatedly without losing its speed and
accuracy for a long time. 13. Research process through which problem solving
and self-directed learning skills are fostered is
10. The capability of a computer hardware or known as __.
software system to communicate and work A. Information Literacy
effectively with another system in the exchange B. Computer Literacy
of data, usually a system of a different type, C. Digital Literacy
designed and produced by a different vendor. D. Media Literacy
A. Internet access
B. Interoperability Answer: A (Information Literacy)
C. Internet Protocol
D. Internet use Notes: Information literacy is the ability to find,
evaluate, organize, use, and communicate
Answer: B (Interoperability) information in all its various formats, most notably in
situations requiring decision making, problem
11. Cybernetics is the study of control and solving, or the acquisition of knowledge. It is a
communication between ___. combination of research skills, critical thinking skills,
A. Hardware and Software computer technology skills, and communication skills.
B. Man and Machine
C. Machine and Machine 14. Major problems of ‘Information Technology’ are:
D. Software and Internet a) Information overload
b) Information insecurity
Answer: B (Man and Machine) c) Lack of innovative technologies
Notes: Cybernetics is a transdisciplinary approach for d) Lack of control over communication
exploring regulatory systems—their structures, A. a and b are correct
B. a, c and d are correct
2 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

C. b, c and d are correct D. Samsung


D. a, b, and d are correct
Answer: B (Apple)
Answer: D
Notes: The iPod and the iPad are both manufactured by
15. Which computer is a combination of both analog Apple Inc. The iPod, first version released in 2001, is a
and digital components? portable media player (a music player which can also
A. Hybrid store videos, photos) and a very smaller in size as
Library Info

Library Info
B. Analog compared to iPad. It does not have internet browsing
C. Micro facility except the newest 7th generation iPod touch
D. Digital released in 2019.

Answer: A (Hybrid) In contrast, the iPad first version released in 2010 is a


tablet computing device, much bigger in size as
16. Computers which can both count and measure compared to iPod and can perform internet browsing and
are called __. other operations effectively.
A. Hybrid computers
B. Analog computers 19. PDA stands for __.
C. Digital computers A. Personal Digital Assistance
D. Super Computers B. Personal Digital Archive
C. Personal Document Archive
Answer: A (Hybrid Computers) D. Program Download Accessories
Notes: Hybrid computers are computers that exhibit Answer: A (Personal Digital Assistance)
features of both analog computers and digital
computers. Hybrid computer accepts analog signals, Notes: Personal digital assistant (PDA) is a term for a
converts them to digital and processes them in digital small, handheld device computer that provides
form. Hybrid computers are used in process control and computing and information storage and retrieval
robotics. capabilities for personal or business use, often for
keeping schedules, calendars and address book
17. What is the correct order of decreasing efficiency information handy. It is now being replaced by
of the following categories of computers? Smartphones.
a) Personal computer
b) Mainframe computer 20. IBM 360 belongs to __.
c) Super computer A. Mini computer
d) Mini Computer B. Micro computer
A. (a), (d), (c) and (b) C. Mainframe computer
B. (c), (b), (d), and (a) D. Super computer
C. (c), (d), (b) and (a)
D. (d), (a), (b) and (c) Answer: C (Mainframe computer)

Answer: B Notes: The IBM System/360 (S/360) is a family of


mainframe computer systems that was announced
18. iPods and iPads are products of __. by IBM on April 7, 1964. It was the first family of
A. Intel computers designed to cover the complete range of
B. Apple applications, from small to large, both commercial and
C. IBM scientific.

3 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

21. In 1642, Blaise Pascal constructed a __. C. b, c and d are correct


A. Digital calculating machine D. a and c are correct
B. Desk calculator
C. Analytical Engine Answer: D
D. Tabulator 25. Phases of Third generation computers belong to
Answer: A (Digital calculating machine) the year __.
A. 1940-1945
Library Info

Library Info
Notes: Blaise Pascal, the French mathematician, B. 1952-1964
invented a mechanical calculator in 1642. The machine C. 1946-1952
was called ‘Arithmetic Machine’ or ‘Pascaline’. D. 1964-1971

22. Who among the following is considered ‘the Answer: D (1964-1971)


farther of Supercomputing’?
A. Seymour Cray Notes: Development & History of Computer generations
B. Tim Berners Lee are:
C. Michael Casey First Generation – (1940 – 1956): Vacuum Tubes;
D. Lillian Cray (Machine language)
Answer: A (Seymour Cray) Second Generation – (1956 – 1963): Transistors; (Low-
Notes: Seymour Roger Cray (1925-1996) was an level programming languages such as Assembly
American electrical engineer and supercomputer language)
architect who designed a series of computers that were Third Generation – (1964 – 1971): Integrated Circuits;
the fastest in the world. (Structured high-level programming languages such
23. Who developed the first Indian Supercomputer? as C, COBOL and FORTRAN)
A. Vijay Pandurang Bhatkar Fourth Generation – (1971 – 1980): Very Large Scale
B. A. P. J Abdul Kalam Integrated (VLSI) Circuits, i.e. Microprocessors; ("Non-
C. M. Vijayan procedural" high-level programming languages, such as
D. None of the above object-oriented languages)
Answer: A (Vijay Pandurang Bhatkar) Fifth Generation – (1980 – Present): Artificial
Notes: Vijay P. Bhatkar is the architect of India's Intelligence; Ultra Large Scale Integration (ULSI)
national initiative in supercomputing where he led the Technology; (Logic programming)
development of Param supercomputers. He developed 26. Which of the following is not correct about
the first Indian supercomputer, the PARAM 8000, in change in computer from one generation to the
1991 and later the PARAM 10000 in 1998. next?
24. User-friendly interface caters to ___. A. Speed of processing increases
a) Human-computer interaction B. Computer size is decreased
b) Individual users with customization C. Memory/storage capacities decreases
c) Simplify execution of operations D. All the above
d) Basis for computer-computer interface Answer: C
A. a and b are correct
B. a, b and d are correct

4 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

Notes: Each generation of computer is characterized by 30. Development of all personal computers took place
a major technological development. With every next in __.
generation, computer size decreased, speed of A. Third Generation Computer
processing increased and memory or storage B. Second Generation Computer
capacities increased. C. Fifth Generation Computer
D. Fourth Generation Computer
27. First generation of computer had used:
A. Magnetic tape and transistors Answer: D (Fourth Generation Computer)
Library Info

Library Info
B. Vacuum tubes and magnetic drum
C. Integrated Circuits Notes: Fourth Generation of computers was between
D. None of the above 1971 – 1980. These computers used the VLSI
technology or the Very Large Scale Integrated (VLSI)
Answer: B (Vacuum tubes and magnetic drum) circuits technology. Therefore they were also known as
the microprocessors. Intel was the first company to
Notes: The first generation of computers used vacuum develop a microprocessor. The first “personal
tubes for circuitry and magnetic drums for memory computer” or PC developed by IBM in 1981,
and they were very big in size. Example: ENIAC and belonged to this generation. VLSI circuits had almost
UNIVAC were first generation computers. about 5000 transistors on a very small chip and were
capable of performing many high-level tasks and
28. Transistors were used in which generation of
computations. These computers were thus very compact
computers?
A. First generation and thereby required a small amount of electricity to run.
B. Second generation 31. In which year, computer was used first in India?
C. Third generation A. 1957
D. None of the above B. 1958
Answer: B (Second Generation) C. 1955
D. 1960
29. Which one is the first generation computer?
A. Micro computer Answer: C (1955)
B. UNIVAC-I Notes: In India, the first computer HEC-2M was
C. Super Computer imported and installed at Indian Statistical Institute (ISI),
D. ENIAC Calcutta in 1955 by the initiative of P. C. Mahalanobis.
Answer: D (ENIAC) 32. Which agency used computer first in India?
A. National Library, Calcutta
Notes: ENIAC (Electronic Numerical Integrator and
Computer), designed and developed by John B. ISI, Calcutta
Mauchly and J. Presper Eckert of the University of C. INSDOC
Pennsylvania, United States in 1945 was the first D. DRTC
electronic general-purpose digital computer. Answer: B (ISI, Calcutta)
Subsequently, UNIVAC I (UNIVersal Automatic Notes: In India, the first computer HEC-2M was
Computer I), designed and developed in 1951 imported & installed at Indian Statistical Institute
principally by J. Presper Eckert and John Mauchly, (ISI), Calcutta in 1955 by the initiative of P C
the inventors of the ENIAC. Mahalanobis who started a journal called ‘Sankhya: the
Indian Journal of Statistics’.
5 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

However, before the import of HEC-2M, Samarendra A. Artificial Intelligence


Kumar Mitra, a Bengali Scientist is given credit to B. Integrated circuits
design in 1954, India's first computer (a small electronic C. Multiple access
analog computer) at the Indian Statistical Institute D. Federation of databases
(ISI), Calcutta.
Answer: A (Artificial Intelligence)
TIFRAC (Tata Institute of Fundamental Research
Automatic Calculator) was the first mainframe general- 36. Artificial Intelligence can be used in every sphere
Library Info

Library Info
purpose computer developed in India, at the Tata of life because of its __.
Institute of Fundamental Research in Mumbai in 1960. A. Ability to think like human beings
B. Ability to work in hazardous places
Subsequently, in 1964, the ISI, Calcutta under the C. Ability to work in artificial environments
leadership of Samarendra Kumar Mitra developed the D. All the above
first second-generation indigenous digital computer
of India called ISIJU-I in joint collaboration Answer: A
with Jadavpur University (JU), Calcutta. 37. A smart system to be able to perform cognitive
33. The concept of ‘artificial intelligence’ belongs to functions that can be associated with the human
___ generation. mind is called:
A. Second A. Cognitive System
B. Third B. Artificial Intelligence
C. Fourth C. Classification System
D. Fifth D. None of the above

Answer: D (Fifth) Answer: B (Artificial Intelligence)

Notes: Artificial intelligence (AI) is the simulation of 38. The concept of ‘Software 2.0’ is given by __.
human intelligence processes by machines, especially A. Michael Casey
computer systems. The term ‘Artificial Intelligence’ was B. Tim Berners Lee
first coined in 1956 by John McCarthy. He is also C. Andrej Karpathy
known for developing Lisp programming language D. Edgar F. Codd
and creating the term ‘Circumscription’ - a non-
Answer: C (Andrej Karpathy)
monotonic logic to formalize the common
sense assumption that things are as expected unless Notes: The concept of Software 2.0 is given by Andrej
otherwise specified. Karpathy, director of Artificial Intelligence at Tesla.
Software 2.0 is translating human intuition into machine
34. The IT used for simulation of the human thought code directly through advances in machine learning.
is known as __.
A. Thinking simulation 39. What is the name of the system that gives
B. Third generation computers relevant suggestion to the end-users while
C. Thought process mechanism searching on some platforms like YouTube,
D. Artificial intelligence Amazon etc.?
A. Clustering System
Answer: D (Artificial intelligence)
B. Autocorrect System
35. Which of the following feature incorporated in C. Recommendation System
Fifth Generation of Computers? D. Autocomplete System

6 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

Answer: C (Recommendation System) facts and rules. The inference engine applies the rules to
the known facts to deduce new facts.
Notes: Recommendations algorithms are part of all
major online businesses these days. They make product 42. Inference Engine is a part of which information
suggestions and can help customers discover new system?
products. Recommendation algorithms that form the A. Management Information System
basis of things like how YouTube makes suggestions as B. Decision Support System
to what new videos a user should watch and how C. Expert System
Library Info

Library Info
eCommerce websites recommend products to buy are D. Open System
part of all e-commerce businesses.
Answer: C (Expert System)
40. Which among the following was the first expert
system? Notes: In the field of Artificial Intelligence, inference
A. PROSPECTOR engine is a component of the system that applies logical
B. MYCIN rules to the knowledge base to deduce new information.
C. DENDRAL The first inference engines were components
D. ANSWER MAN of expert systems. The typical expert system consisted
of a knowledge base and an inference engine. Inference
Answer: C (DENDRAL) engines work primarily in one of two modes either
special rule or facts: forward chaining and backward
Notes: DENDRAL was a chemical-analysis expert chaining. Forward chaining starts with the known facts
system developed by Edward Feigenbaum and his and asserts new facts. Backward chaining starts with
team at Stanford University, United States around 1965. goals, and works backward to determine what facts must
be asserted so that the goals can be achieved.
41. Who is called the father of ‘Expert Systems’?
A. John Gaschnig 43. The logic ‘IF-THEN rules’ applied in __.
B. Nils Nilsson A. Inference Engine
C. Richard Duda B. Decision support system
D. Edward Feigenbaum C. Management Information System
Answer: D (Edward Feigenbaum) D. None of the above

Answer: A (Inference Engine)


Notes: Expert systems were among the first truly
successful forms of artificial intelligence (AI) software. Notes: The logic that an inference engine uses is
In artificial intelligence (AI), an expert system is a typically represented as IF-THEN rules. The general
computer system that emulates the decision-making format of such rules is IF <logical expression> THEN
ability of a human expert. Expert systems are designed <logical expression>.
to solve complex problems by reasoning through bodies
of knowledge, represented mainly as ‘if–then rules’. 44. Which of the following are the basic
The first expert system ‘DENDRAL’ was introduced by components of expert system?
Edward Feigenbaum and his team at Stanford a) User interface
University, United States around 1965. Edward b) Knowledge base
Feigenbaum is also called as ‘Father of Expert c) Inference mechanism
Systems’. An expert system is divided into two d) Schema
subsystems: (i) the inference engine, and (ii) A. a, b and d are correct
the knowledge base. The knowledge base represents B. a, b and c are correct
C. b, c and d are correct
7 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

D. a, c, and d are correct Notes: Von Neumann architecture was first published
by John von Neumann in 1945. This computer
Answer: B architecture design is based on the stored-program
Notes: There are 5 components of Expert Systems: concept, where instruction data and program data are
(i)Knowledge Base (ii) Inference Engine (iii) stored in the same memory. Von Neumann
Knowledge acquisition and learning module (iv) User architecture is composed of three distinct
Interface (v) Explanation module components: (i) Central Processing Unit (CPU) (ii)
Library Info

Library Info
Memory, and (iii) Input /Output Interfaces. CPU which
45. Select the correct combinations from the is considered the heart of the computer system
following: includes three main components: (i) the Control Unit
A. MYCIN – Expert system in medicine (CU) - The control unit determines the order in which
B. DENDRAL – Chemical analysis expert instructions should be executed. The execution of each
system instruction is determined by a sequence of control
C. PROSPECTOR – Mineral exploration signals produced by the control unit. (ii) Arithmetic
expert system Logic Units (ALUs) - ALUs perform all mathematical
D. All the above and Boolean operations, and (iii) Registers - The
registers are temporary storage locations to quickly store
Answer: D and transfer the data and instructions being used.
Notes: There are numerous examples of expert systems. 47. IBM stands for ___.
DENDRAL was an Artificial Intelligence based expert A. International Bibliographic Management
system used essentially for chemical analysis. B. International Business Machines
MYCIN was an early backward chaining expert C. International Bibliographic Data
system that used artificial intelligence to identify Management
bacteria causing severe infections. It was developed at D. International Business Management
Stanford University during early 1970s. INTERNIST-
I was a computer-assisted diagnostic tool developed in Answer: B (International Business Machines)
the early 1970s at the University of Pittsburgh.
Notes: IBM Corporation began in 1911, at Endicott,
CADUCEUS was another medical expert
system finished in the mid-1980s by Harry Pople of the New York, as the Computing-Tabulating-Recording
University of Pittsburgh. PROSPECTOR is an expert Company (CTR) and was renamed as "International
Business Machines" in 1924. It is also known by the
system designed for decision-making problems in
nickname ‘Big Blue’.
mineral exploration. It was developed between 1976 and
1981 by Richard Duda and his team in United States. 48. What is embedded system?
A. The programme which arrives by being
Computer Hardware & Devices wrapped in a box
46. Modern computers are based on a stored- B. The programme which is the permanent part
program concept introduced by __. of the computer
A. John Von Neumann C. The computer which is the part of a big
B. Tim Berners Lee computer
C. Kevin Ashton D. The computer and software system that
D. Allan M. Schiffman control the machine

Answer: A (John Von Neumann) Answer: D

8 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

Notes: An embedded system is a combination of A. Video Graphics Array


computer hardware and software designed for a B. Visual Graphics Array
specific function. It is also known as integrated system C. Volatile Graphics Array
due to its combination of hardware and software. Some D. Video Graphics Adapter
of the examples of an embedded system are
smartphones, washing machines, Air conditioners etc. Answer: A (Video Graphics Array)

49. Which of the following are embedded processors? Notes: VGA stands for ‘Video Graphics Array’. It is the
Library Info

Library Info
a) Micro Controller standard monitor or display interface used in most PCs.
b) Digital Signal Processor
53. Arrange the following chronologically according
c) Cor 2 extreme
to their development:
d) Intel Xeon a) Vacuum tube
b) Microchip
A. a, b, and d are correct c) Transistor
B. a, c and d are correct
d) Integrated Circuit
C. a and d are correct
D. b and d are correct A. (a), (c), (d) and (b)
Answer: A B. (c), (a), (d), and (b)
C. (c), (d), (b) and (a)
50. Which of the following is the heart of computer? D. (d), (a), (b) and (c)
A. Micro-Processor
B. RAM Answer: A
C. ALU
Notes: Vacuum tube (First Generation of Computer);
D. CPU Transistor (Second Generation of Computer); Integrated
Answer: D (CPU) Circuits (Third Generation of Computer); Microchip
(Fourth Generation of Computer).
Notes: The Central Processing Unit (CPU), often called
just the ‘Processor’ is the heart of the computer. It 54. Arrange the following in the order of their
controls everything that happens in the computer. It has emergence :
three main components: (i) the Control Unit (CU) (ii) a) Integrated circuit
Arithmetic Logic Units (ALUs) and (iii) Registers b) Transister
c) Vacuum Tube
51. Which is the most important part of computer d) Chip
terminal? A. (a), (d), (c) and (b)
A. ALU B. (c), (a), (d), and (b)
B. CPU C. (c), (b), (a) and (d)
C. CU D. (d), (a), (b) and (c)
D. Output
Answer: C
Answer: B (CPU)
55. Select the correct combinations:
Notes: The most important part of all computers is the a) Vacuum Tube – First Generation Computer
CPU (Central Processing Unit). b) Pendrive – Flash memory
c) DVD – Optical storage
52. VGA stands for __. d) Transistor – Second Generation Computer
9 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

A. a and d are correct 59. Select the right sequence of the following devices
B. b and c are correct according to their storage capacity in descending
C. a and b are correct order:
D. All are correct
A. CD, DVD, Floppy Disc, Punched Card
Answer: D B. DVD, CD, Floppy Disc, Punched Card
C. Punched Card, Floppy Disc, CD, DVD
56. Arrange the following chronologically, as per D. Floppy Disc, Punched Card, CD, DVD
Library Info

Library Info
their development:
Answer: B
a) Punched card
b) Optical disc 60. DVD stands for __.
c) Magnetic disc A. Digital Versatile Disc
d) Floppy disc B. Digital Volatile Disc
C. Digital Venerable Disc
A. (a), (c), (d) and (b) D. Digital Varying Disc
B. (c), (a), (d), and (b)
C. (c), (d), (b) and (a) Answer: A (Digital Versatile Disc)
D. (d), (a), (b) and (c)
Notes: DVD (Digital Versatile Disc or Digital Video
Answer: A Disc) is a digital optical disc storage format invented and
developed in 1995 and first released in late 1996 in
57. Who is known as the father of ‘Punched Card’? Japan.
A. Howard Read
B. Neuman 61. A standard CD-ROM usually store up to ___
C. Herman Hollerith data?
D. Charles Babbage A. 680 KB
B. 680 Bytes
Answer: C (Herman Hollerith) C. 680 MB
D. 680 GB
Notes: Herman Hollerith (1860-1929) is the father of
modern machine data processing. He invented and Answer: C (680 MB)
developed a punch-card tabulation machine system that
revolutionized statistical computation. Notes: CD-ROM stands for ‘Compact Disc – Read Only
Memory. An standard CD-ROM can store up to 680
58. Arrange the following in ascending order megabytes of data.
according to their storage capacity:
a) Magnetic Disc 62. ISO-9960 is related with?
b) CD-ROM A. Standard for encoding data on CD-ROM
c) Magnetic Tape B. Standard for Computer Hardware
d) Floppy Disc C. Standard for Information processing
A. (a), (d), (c) and (b) D. Standard for Networking
B. (c), (a), (d), and (b)
Answer: A (Standard for Encoding Data on CD-
C. (c), (d), (b) and (a)
D. (d), (c), (a) and (b) ROM)

Notes: ISO 9660 is the standard file system for CD-


Answer: D
ROMs & DVDs.

10 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

63. Which storage media allows sequential access A. An input device


only? B. An output device
A. Magnetic disc C. A storage device
B. Optical disc D. A processing device
C. Floppy disc
D. Magnetic tape Answer: A (An input device)

Answer: D (Magnetic tape) Notes: In computers, a joystick is a cursor control


Library Info

Library Info
device used in computer games and assistive
64. Keyboard, mouse, scanner and cursor etc. of technology. The joystick is a hand-held lever that pivots
computer are the __. on one end and transmits its coordinates to a computer.
A. Input devices
B. Memory devices 68. Which is output device of computer?
C. Output devices A. Joy stick
D. Storage devices B. Key board
C. Mouse
Answer: A (Input devices) D. Plotter

65. Who devised Mouse system for computer? Answer: D (Plotter)


A. Intel
B. Douglas Engelbart Notes: A plotter is a computer hardware device much
C. IBM like a printer that is used for printing vector
D. Ted Hoelf graphics. Instead of toner, plotters use a pen, pencil,
marker, or another writing tool to draw multiple,
Answer: B (Douglas Engelbart) continuous lines onto paper rather than a series of dots
Notes: The computer mouse was first invented like a traditional printer.
by Douglas Engelbart in the 1960s, then a computer
scientist at the Stanford Research Institute. 69. The output quality of a printer is measured by
__.
A. Dot per inch
66. The term “QWERTY” is connected to which of
B. Dot per sq. Inch
the following devices?
C. Dots printed per unit time
A. Monitor
D. All the above
B. Scanner
C. CD-ROM Answer: A (Dot per inch)
D. Keyboard
Notes: The output quality of a printer is measured
Answer: D (Keyboard) by Dots per inch. DPI [Dots Per Inch] is a measurement
of output quality of printer resolution. It represents
Notes: QWERTY is a keyboard design for Latin-
number of ink dots the printer can place in an area of one
script alphabets. The name comes from the order of
square inch.
the first six keys on the top left letter row of the
keyboard (Q W E R T Y). The QWERTY design is 70. Which among the following is a pointing
based on a layout created by Christopher Latham device?
Sholes and sold to E. Remington and Sons in A. Touch screen
1873. B. Sensors
C. Scanning device
67. Joystick is ___.
11 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

D. Light pens Answer: B (Bit)

Answer: D (Light pens) 74. A binary object which can have a value of 0 or 1
is called:
Notes: Light Pen (similar to the pen) is a pointing device A. Byte
which is used to select a displayed menu item or draw B. Bit
pictures on the monitor screen of a computer. It is a C. Decimal
small, photosensitive computer input device which is D. Octal
Library Info

Library Info
connected to a computer and moved by hand over an
output display in order to manipulate information in the Answer: B (Bit)
computer.
75. Nibble contains __.
71. 1 Gigabyte (GB) is __. A. 16 bit
A. 1024 Bytes B. 8 bit
B. 1024 KB C. 1024 bit
C. 1024 MB D. 4 bit
D. 1024 GB
Answer: D (4 bit)
Answer: C (1024 MB)
Notes: A bit (short for binary digit) is the smallest unit
72. Arrange the following in ascending order: of data in a computer. A bit has a single binary value,
a) Exa Byte either 0 or 1. ... 8 bits = 1 byte, and half a byte
b) Peta Byte (four bits) is called a nibble. In some systems, the term
c) Zetta Byte octet is used for an eight-bit byte. Hence nibble can be a
d) Yotta Byte half octet as well (4 bits).

A. (a), (b), (c) and (d) 76. The internal memory units of computer are __.
B. (b), (a), (c), and (d) A. ROM and RUM
C. (c), (d), (b) and (a) B. RAM and ROM
D. (d), (a), (b) and (c) C. RAM and WROM
D. None of the above
Answer: B
Answer: B (RAM and ROM)
Notes: Bit (Short for ‘Binary digit’, the smallest unit of
data in a computer; a bit has a single binary value, either Notes: Computer memory is of two types: (i) Primary
0 or 1) – Nibble (4 bits) – Byte (8 bits) – Kilobyte (1024 memory - often called internal memory or system
bytes, 103) – Megabyte (1024 KB, 106) – Gigabyte (1024 memory which is located close to the CPU on a
MB, 109) – Terabyte (1024 GB, 1012) – Petabyte (1024 computer. Primary memory includes RAM (Random
TB, 1015) – Exabyte (1024 PB, 1018) – Zettabyte (1024 Access Memory) and ROM (Read Only Memory). (ii)
EB, 1021) – Yottabyte (1024 ZB, 1024). Secondary memory - is usually physically located
within a separate storage device, such as a hard disk
73. The smallest unit in the computer that represents drive or solid state drive (SSD).
information is __.
A. Byte 77. Example of Primary memory:
B. Bit A. Hard disc
C. Character B. CD
D. Digit C. DVD

12 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

D. RAM Memory) and DRAM (Dynamic Random Access


Memory). Static RAM (SRAM) is faster than dynamic
Answer: D (RAM) RAM (DRAM) as the access time for DRAM is more as
Notes: Computer memory is of two basic type – compared to that of SRAM.
Primary memory (RAM and ROM) and 80. The computer memory which is essentially empty
Secondary memory (hard drive, CD, etc.). Random is:
Access Memory (RAM) is primary-volatile memory and A. RAM
Library Info

Library Info
Read Only Memory (ROM) is primary-non- B. ROM
volatile memory. It is also called as read C. PROM
write memory or the main memory or the primary D. EPROM
memory.
Answer: A (RAM)
78. Which among the following comes under Primary
Storage? Notes: The RAM is a volatile memory, it means
a) RAM information written to it can be accessed as long as
b) ROM power is on. As soon as the power is off, it cannot be
c) Cache accessed. So this means RAM computer memory
d) Magnetic Tape essentially empty. RAM holds data and processing
A. a and d are correct instructions temporarily until the CPU needs it.
B. b and c are correct
C. a b, and c are correct 81. Which of the following is an example of non-
D. All are correct volatile memory?
Answer: C A. ROM
B. VLSI
Notes: Primary storage is also called as ‘Main C. LSI
Memory’ which are connected directly or indirectly to D. RAM
the Central Processing Unit (CPU) of the computer and
helped in reading instructions and executing them. Answer: A (ROM)
Examples of Primary storage are: RAM, ROM and
Notes: Read only memory (ROM) is a non volatile
Cache.
memory. It means the information stored in it, is not lost
79. The computer memory used for temporary storage even if the power supply goes off. It is used for the
of data and program is called: permanent storage of information. Information cannot be
A. RAM written into a ROM by the users/programmers. In other
B. ROM words the contents of ROMs are decided by the
C. PROM manufactures. It is used in embedded systems or where
D. EPROM the programming needs no change. ROM are of three
types: PROM (Programmable read-only memory) – It
Answer: A (RAM) can be programmed by user. Once programmed, the data
and instructions in it cannot be changed. EPROM
Notes: RAM (Random Access Memory) is a volatile
(Erasable Programmable read only memory) – It can
memory that temporarily stores the programs and data in
be reprogrammed. To erase data from it, expose it to
use that the CPU requires during execution of a program.
ultra violet light. To reprogram it, erase all the previous
It requires power to store data and loses data when
data. EEPROM (Electrically erasable programmable
power is turned off. RAM is further classified into two
read only memory) – The data can be erased by
types- SRAM (Static Random Access
13 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

applying electric field, no need of ultra violet light. We Notes: A Random Access Memory (RAM) is a volatile
can erase only portions of the chip. chip memory in which both read and write operations
can be performed. Since it is volatile, therefore it stores
82. The computer memory, which can be data as long as power is on. RAM is also known as
programmed once, but cannot be reprogrammed, RWM (Read Write Memory).
is __.
A. PROM 86. ROMs retain data when __.
B. SRAM A. Power is on
Library Info

Library Info
C. RAM B. Power is off
D. EPROM C. System is down
D. All the above
Answer: A (PROM)
Answer: D (All the above)
83. The computer memory which can be
reprogrammed is __. Notes: ROM retains the data when power is off/on/down
A. ROM because it has to read the data from memory only and it
B. PROM is done in every condition. It is non-volatile memory.
C. EPROM
D. All the above 87. Which storage medium helps in accessing data
more quickly?
Answer: C (EPROM) A. RAM
B. ROM
Notes: The EPROM (Erasable Programmable Read C. Cache
Only Memory) was invented by Dov Frohman of Intel D. EPROM
in 1971. EPROMs are Erasable Programmable ROMs
which can be erased using Ultra Violet radiation and re- Answer: C (Cache)
programmed.
88. Name the storage medium (compatible with
84. The major disadvantage of RAM is __. speed of CPU) for storing instructions or data
A. Its access speed is too slow temporarily during processing __.
B. Its matrix size is too big A. RAM
C. It is volatile B. ROM
D. High power consumption C. Cache
D. EPROM
Answer: C (It is volatile)
Answer: C (Cache)
Notes: RAM is volatile memory. Thus, RAM stores the
data as long as it is powered on and once the power goes Notes: Cache stores recently used information so that it
out, it loses its data. can be quickly accessed at a later time. Common types
of caches include browser cache, disk cache,
85. RAM is also known as __. memory cache, and processor cache.
A. RWM
B. MBR Computer Software & Applications
C. MAR
D. ROM 89. Waterfall model is associated with __.
A. Data flow
Answer: A (RWM) B. System Analysis & Design

14 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

C. Data Transfer within computer Answer: B (Christine Peterson)


D. Digital divide
Notes: Open source software is a type of computer
Answer: B (System Analysis & Design) software in which source code is released under a
license in which the copyright holder grants users the
Notes: First introduced in by Dr. Winston W. Royce in rights to study, change and distribute the software to
1970, the waterfall model is the pioneer of all SDLC anyone for any purpose. The Open Source Initiative
(Software Development Life Cycle) processes. It was (OSI) was formed in February 1998 by Eric Raymond
Library Info

Library Info
also the first model widely used in the software industry. and Bruce Perens.
This model is divided into phases and the output of each 93. Groupware is a __.
phase becomes the input of the next. Every phase needs A. Blog
to be completed first before a succeeding phase could B. System software
begin. In short, overlapping will not happen in the C. Collaborative software
waterfall model. The phase of SDLC includes: (i) D. Search Engine
Requirement Analysis (ii) Requirement Specification
(iii) Design Phase (iv) Implementation & Unit Testing Answer: C (Collaborative Software)
(v) Integration & System Testing (vi) Operation &
Maintenance Notes: Groupware refers to programs that help people
work together collectively while located remotely from
90. Identify the feature of proprietary software: each other. Programs that enable real time collaboration
a) Continuity and Development are called synchronous groupware.
b) Ease of use
c) Transparency 94. Which one of the following is meant for Word
d) Documentation and Support processing?
A. Dbase
A. a and b are correct B. LibSys
B. a, b and d are correct C. WordStar
C. b, c and d are correct D. CDS/ISIS
D. a and c are correct Answer: C (WordStar)
Answer: B
95. D-Base is ___.
91. Major two characteristics of open source are: A. Application Software
A. Free copyright & free distribution B. System Software
B. Open and no IPR C. Internal Software
C. Free distribution and open source code D. External Storage
D. Free license and no IPR Answer: A (Application Software)
Answer: C (Free distribution and open source code)
96. MS-DOS is a __.
92. The term ‘Open source’ was coined by: A. Single user open source
A. Tim Berners Lee B. Multi user open source
B. Christine Peterson C. Single user
C. Peter Merholz D. Multi user
D. Michael Casey Answer: C (Single user)

15 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

97. MS-DOS stands for __. Answer: A (Structured specification)


A. Machine Disk Operating System
B. Machine Document Operating System 102. Recently deleted files from computer are stored
C. Microsoft Disk Operating System at which place in the computer?
D. Microsoft Document Operating System A. Recycle Bin
B. Desktop
Answer: C (Microsoft Document Operating System) C. Taskbar
D. My Computer
Library Info

Library Info
Notes: MS-DOS (Microsoft Disk Operating System) is
an operating system for x86-based personal computers Answer: A (Recycle Bin)
mostly developed by Microsoft and initially released in
1981. 103. BIOS contain:
a) Operating system program
98. Windows, Linux, Unix etc. are examples of __. b) Bootstrap Program
A. System software c) Application System Program
B. Application software d) Convert Character to Code Program
C. Software A. a and b are correct
D. Operating systems B. a, c and d are correct
C. b and d are correct
Answer: D (Operating systems) D. a and c are correct
99. DOS, UNIX, LINUX, Windows are examples of Answer: C
__.
A. Application Software 104. BIOS is a __.
B. System software A. Application program
C. Computer language B. System software
D. Operating system C. Booting software
D. Plagiarism software
Answer: D (Operating System)
Answer: C (Booting software)
100. File management is a work of __?
A. Operating system Notes: BIOS (Basic Input Output System) is booting
B. Middle ware software stored on a small memory chip on
C. Utility software the motherboard. It helps to get the computer system
D. GUI starts and manages data flow between the computer's
operating system and attached devices such as hard disk,
Answer: A (Operating System) keyboard, mouse and printer.
Notes: File management is the process of manipulating 105. Program which is used to control system
files (creating, modifying and deleting) in a computer performance is classified as __.
system. Operating system is used to manage files of a A. Experimental program
computer system. B. System program
C. Specialized program
101. Template is a __.
D. Organized program
A. Structured specification
B. Recursive routine Answer: B (System program)
C. Assembler program
D. I/O measure 106. ‘Linux’ is an example of __.
16 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

A. Application software a) Kernel


B. System software b) Shell
C. Library software c) Format
D. None of the above d) Application

Answer: B (System Software) A. a, b, and d are correct


B. c, b and d are correct
Notes: Linux is free and open source operating
Library Info

Library Info
system/system software developed by Linus Torvalds C. a, c, and d are correct
and first released in September 1991 under GPL license. D. c, a and b are correct

Answer: A
107. Which of these is a multi user open source
operating system? Notes: The UNIX operating system (OS) consists of a
A. MS-DOS kernel layer, a shell layer and a utilities and applications
B. UNIX layer. These three layers create a portable, multiuser,
C. LINUX multitasking operating system.
D. WINDOWS
111. Arrange the following in chronological order of
Answer: C (LINUX) their origin:
Notes: Linux is an open-source multi-user operating a) Unix
systems based on the Linux kernel, an operating system b) MS-DOS
kernel first released on September 17, 1991 by Linus c) Linux
d) Windows
Torvalds, a Finnish-American software engineer.
A. (a), (d), (c) and (b)
108. Which of the following is NOT true for Linux B. (b), (a), (d), and (c)
operating system? C. (c), (d), (b) and (a)
A. Multiuser capability D. (d), (a), (b) and (c)
B. Communication
C. Not secure Answer: B
D. Multitasking Notes: MS-DOS stands for Microsoft Disk Operating
System, developed by Microsoft and initially released in
Answer: C (Not Secure)
1981, Windows (Microsoft, 1985); Linux ( Linus
109. Ubuntu is primarily ___. Torvalds, 1991).
A. An application software
112. Microsoft (MS) Office is an example of which
B. A web browser
C. An operating system type of software?
D. A database A. System Utility Software
B. Application Software
Answer: C (An Operating System) C. System Software
D. Utility software
Notes: Ubuntu is a free and open-source Linux
distribution based on Debian. It was developed by Answer: B (Application software)
Canonical Ltd and first released in 2004.
Notes: Microsoft Office, first introduced in 1990, is a set
110. Which of the following are the different layers of computer applications mainly used for business or
of UNIX operating system? office purposes.
17 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

113. ‘OpenOffice’ is developed by __. Standard Z39.50 Information Retrieval Service


A. IBM Definition and Protocol Specifications for Library
B. Apache Foundation Applications, to search and index databases on remote
C. Apple computers. It was developed in 1988 by Thinking
D. Microsoft Corporation Machines Corporation (TMC) of Cambridge,
Massachusetts.
Answer: B (Apache Foundation)
117. Internet server is known as __.
Library Info

Library Info
Notes: Apache OpenOffice is an open-source office A. Host
productivity software suite. It is one of the successor B. Bridge
projects of OpenOffice.org. It was first released in 2001. C. Hub
114. ‘iWork’ is an office suite of application created D. Client
by: Answer: A (Host)
A. IBM
B. Apache Foundation 118. Apache Tomcat is a __.
C. Apple A. Web server
D. Microsoft Corporation B. DBMS
C. Search Engine
Answer: C (Apple) D. Gateway
Notes: iWork is an office suite of applications created by Answer: A (Web server)
Apple Inc. for its macOS and iOS operating systems,
and also available cross-platform through the iCloud Notes: Apache, is free and open-source cross-platform
website. It was first released in 2005. web server software, released under the terms of Apache
License 2.0 in 1995.
115. Select the correct combinations:
a) Open Office – Apache Foundation 119. Operating system developed by Google for
b) MS-Office – Microsoft Corporation mobile phone is called:
c) Lotus Note – IBM A. Opera
d) iWork – Apple B. Android
A. a and d are correct C. Apple
B. b and c are correct D. Linux
C. a and b are correct
D. All are correct Answer: B (Android)
Answer: D
Notes: Android is a mobile operating system developed
116. WAIS stands for __. by Google, first released in 2008. It is based on a
A. Wide Area Internet Service modified version of the Linux kernel and other open
B. Wide Area Information Server source software, and is designed primarily for touch
C. Whole Area Internet Service screen mobile devices such as smart phones and tablets.
D. Wide Area Internet Server
120. Team viewer is a __.
Answer: B (Wide Area Information Server) A. Image software
B. Remote login software
Notes: Wide Area Information Server (WAIS) is a C. DBMS software
client–server text searching system that uses the ANSI D. OCR software

18 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

Answer: B (Remote Login Software) ; DCL (Data Control Language) - It is used to retrieve
the stored or saved data; and TCL (Transaction Control
Notes: TeamViewer is proprietary software for remote Language) - It is used to run the changes made by the
control, desktop sharing, online meetings, web DML statement.
conferencing and file transfer between computers.
124. Relational database is __.
121. The ’12 Rules for Relational Database’ were A. A work which has some relationship with
given by __. another work
Library Info

Library Info
A. Edgar F. Codd B. A symbol representing relationship between
B. Larry Page two concepts
C. J. Bill Gates C. Manipulation commands which relate
D. Linus Tolward records in different fields
Answer: A (Edgar F. Codd) D. A mechanism which transfer database from
one field to another field
Notes: Edgar F. Codd (1923-2003) was an English
computer scientist worked for IBM, invented the Answer: C
relational database management systems and given the 125. The expansion of RDBMS is __.
‘12 Rules for Relational Database’. Codd's twelve rules A. Research Database Management System
are a set of thirteen rules (numbered zero to twelve). B. Rational Database Management System
122. What is full form of DBMS? C. Relational Database Management System
A. Data Base Management Services D. Reference Database Management System
B. Data Base Management Systems Answer: C (Relational Database Management
C. Data Base Manager Services System)
D. Data Base Managing Systems
Notes: An RDBMS is a DBMS designed specifically
Answer: B (Data Base Management Systems) for relational databases. A relational database refers to
123. Which of the following is not a language of a database that stores data in a structured format,
DBMS? using rows and columns. This makes it easy to locate
A. DDL and access specific values within the database. It is
B. DML "relational" because the values within each table are
C. PASCAL related to each other. The term "relational database" was
D. TCL invented by Edgar F. Codd at IBM in 1970.

126. RDBMs are advantageous as they :


Answer: C (Pascal)
a) Manage and Maintain
Notes: Database languages are used to define and b) Represent data in the form of tables
manipulate a database. In other words, database c) Facilitate handling of objects rather than
languages are used to read, store and update the data in record
the database. DBMS languages are of following types: d) Are developed with mathematic theory of
DDL (Data Definition Language) - It is used to define relations
database structure, i.e. creating schema, tables, indexes A. b and d are correct
and constraints, etc in a database; DML (Data B. a, c and d are correct
Manipulation Language) - It is used for accessing and C. c and d are correct
manipulating data in a database. It handles user requests D. a and c are correct

19 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

Answer: A Informix Corporation, whose Informix Software


subsidiary was acquired by IBM in 2001.
127. Sybase was related to __.
A. Search protocol 130. LAMP stands for __.
B. Indexing and Retrieval software A. Library Archives Management Programme
C. Web servers B. Laser Analysis and Multimedia Performance
D. Database Management Software C. Linux, Apache, MySQL, PHP
D. Library Automation Management Protocol
Library Info

Library Info
Answer: D (Database Management Software)
Answer: C (Linux, Apache, MySQL, PHP)
Notes: Sybase, founded in California (US) in 1984, was
an enterprise software and services company that Notes:LAMP (Linux, Apache, MySQL, PHP/Perl/Pyth
produced software to manage and analyze information in on) is a web service stack, named as an acronym of the
relational databases. Sybase was acquired by SAP in names of its original four open-source components:
2010; SAP ceased using the Sybase name in 2014. the Linux operating system, the Apache HTTP
Server, the MySQL relational database management
128. SQL stands for ___. system (RDBMS), and the PHP programming
A. Structured Query Language language. A similar Web Server Bundle for Microsoft
B. Soft Query Language Windows operating systems is known as WAMP
C. Standard Query Language (Windows, Apache, MySQL, PHP/Perl/Python) and an
D. Slanted Query Language equivalent installation on MacOS is known as MAMP
Answer: A (Structured Query Language) (MacOS, Apache, MySQL, PHP/Perl/Python) and
SAMP (Solaris, Apache, MySQL, PHP/Perl/Python) on
Notes: SQL is a domain-specific language used in Solaris and XAMPP (X for Cross Platform,
programming and designed for managing data held in a Apache, MariaDB/MySQL, PHP, Perl ) for Cross
relational database management system (RDMS). Platform Web Server Service Pack.

129. Informix is a __. 131. Which among the following is NOT


A. Image software included in XAMPP?
B. Remote login software A. Apache
C. DBMS software B. MySQL
D. OCR software C. PERL
D. Python
Answer: C (DBMS Software)
Answer: D
Notes: DBMS (Database management system) is used
to create and maintain the structure of a database, and Notes: XAMPP a free and open source cross-
then to enter, manipulate and retrieve the data it stores. platform web server package. It stands for:
A database management system (DBMS) is computer X - stands for Cross Platform (Means you can
software that manages databases, it may use any of a install XAMPP on any Operating System); A –
variety of database models, such as the hierarchical Apache Server; M – MySQL; P-PHP (Scripting
DBMS, network DBMS and relational DBMS. language); P – PERL (Programming language)
Charles Bachman was known for the early development
of DBMS in 1960’s. IBM Informix is a relational 132. WAMP software bundle is created by __.
database management system, originally developed by A. Romain Bourdon
B. Linus Tolward
C. Tim Berners Lee
20 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

D. None of the above Notes: SYSTRAN, founded by Dr. Peter Toma in 1968,
is one of the oldest machine translation companies.
Answer: A (Romain Bourdon)
Programming Languages
Notes: WAMP refers to a software stack for
the Microsoft Windows operating system, created by 136. Which of the following three types of basic
Romain Bourdon and consisting of Windows, Apache languages are used in computer programming?
web server, MySQL database and PHP programming A. COBOL, BASIC, C
Library Info

Library Info
language. Another variant WIMP (Windows, Internet B. Procedural, Non-Procedural and
Information Services (IIS), MySQL, PHP) is a similar Unconditional
package where the Apache is replaced by Internet C. Zero, Low and High Levels
Information Services (IIS). D. Machine, Assembly and High Level
Languages
133. Identify the components of ‘LAMP’ given
below: Answer: D (Machine, Assembly and High Level
a) Linux Languages)
b) Acrobat
c) MYSQL 137. Which programming languages are
d) Perl/PHP classified as low level languages?
A. BASIC, COBOL, FORTRAN
A. a, b, and c are correct B. Prolog
B. c, b and d are correct C. C, C++
C. a, c, and d are correct D. Assembly languages
D. c, a and b are correct
Answer: D (Assembly Languages)
Answer: C
Notes: A low-level language is a programming language
134. BABYLON is computer software for __. that provides little or no abstraction of programming
A. Digital library concepts and is very close to writing actual machine
B. Library management system instructions. Examples of low-level languages are:
C. Translation Assembly languages and machine code. High level
D. Statistical Calculation languages such as C, C++, JAVA, Python, COBOL,
FORTRAN are programmer friendly languages that a
Answer: C (Translation) programmer can easily understand, interpret or compile.
On the other hand, Low level languages are machine
Notes: Babylon is a computer dictionary and translation
friendly languages and tough to understand by human
program developed by the Israeli company Babylon
beings.
Software Ltd. The company was established in 1997 by
the Israeli entrepreneur Amnon Ovadia. 138. In computer terminology, the term ‘bug’ stands
for __.
135. SYSTRAN and LOGOS are __.
A. Error in programming
A. Translation pools
B. Computer virus
B. Translation software
C. Error in Humanware Selection
C. System Software
D. Error in hardware Selection
D. Remote Login Software
Answer: A (Error in Programming)
Answer: B (Translation Software)

21 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

139. An Application Program Interface (API) Notes: Developing a program involves steps similar to
language is used for ___. any problem-solving task. The following are main steps
A. Network Management in the programming process: (i) Defining the Problem
B. Graphical User Interface (ii) Planning/Designing the Solution (iii) Coding the
C. Relational Interface in Database Program (iv) Testing the Program (v) Documenting
Management the Program (vi) Maintenance
D. Database Management System
142. Arrange the following coding standards by the
Library Info

Library Info
Answer: B (Graphical User Interface) year of their origin:
a) ASCII
Notes: Graphical user interface (GUI) is a form b) Unicode
of user interface that allows users to interact with c) ISCII
electronic devices through graphical icons and audio d) EBCDIC
indicator such as primary notation, instead of text-based
user interfaces, typed command labels or text navigation. A. (a), (d), (c) and (b)
B. (c), (a), (d), and (b)
140. A computer program that converts one by one
instruction into a machine language is called: C. (c), (d), (b) and (a)
A. Interpreter D. (d), (a), (b) and (c)
B. Simulator Answer: A
C. Compiler
D. None of the above Notes: ASCII (American Standard Code for Information
Answer: A (Interpreter) Interchange, 1963); EBCDIC (Extended Binary Coded
Decimal Interchange Code, 1963-64); ISCII (Indian
Notes: To convert a program written in high level
Script Code for Information Interchange, 1986-88);
language (i.e English or other languages) into Machine Unicode (1988).
language or Code (ie. 0’s or 1’s), we need a compiler or
Interpreter. One of the differences between compiler and 143. ASCII has how many codes?
interpreter is – Interpreter translates a program one A. 526
statement at a time, while Compiler scans the entire B. 265
program and translates it as a whole into machine C. 256
code. D. 233

141. Arrange in sequence the following steps Answer: C (256)


followed in programming:
a) Programming code Notes: Standard as well as Extended ASCII has 256
b) Programming documentation codes. However, extended ASCII is a version that uses
c) Program Test eight bits to represent a character as opposed to seven in
d) Program Design standard ASCII.

144. The decimal representation for character ‘A’ in


A. (a), (d), (c) and (b)
ASCII is __.
B. (c), (a), (d), and (b)
A. 67
C. (c), (d), (b) and (a)
B. 63
D. (d), (a), (c) and (b)
C. 65
Answer: D D. 69

22 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

Answer: C (65) code for character representation in the computer.


Unicode has incorporated a particular encoding system
Notes: The decimal representation of characters in known as Unicode Transformation Format (UTF).
ASCII is as follows: 0-9 (48-57) and (A –Z (65-90). There are different Unicode Transformation Formats as
145. ISCII stands for __. UTF-8, UTF-16, UTF7 and UTF32. UTF-8 is
compatible with ASCII. Libraries can adopt Unicode to
A. Indian Script Code for Information
give multilingual access to the collection. With use of
Interchange
Library Info

Library Info
B. International Script Code for Information Unicode libraries can provide OPACs in different
Interchange languages.
C. Indian Smart Code for Information 148. Who among the following is associated with the
Interchange development of Unicode?
D. International Smart Code for Information A. Chester Cardson
Interchange B. Doug Cutting
C. Joe Becker
Answer: A (Indian Script Code for Information
D. Peter Merholz
Interchange)

Notes: Indian Script Code for Information Interchange Answer: C (Joe Becker)
(ISCII) is the 8 character code for Indian languages Notes: Unicode was developed by Joe Becker and Lee
which suggests the encoding for all Indian languages Collins of Xerox Corporation and Mark Davis of
that originate from Brahmi script. In 1991, The Bureau Apple. Joe Becker is credited with coining the term
of Indian Standards adopted the Indian Standard Code ‘Unicode’, which stands for ‘unique, universal, and
for Information Interchange. ISCII was evolved by a uniform character encoding’.
standardization committee under the Department of
Electronics during 1986-88. C-DAC was an active 149. In 1990, the Text Encoding Initiative (TEI)
member of the committee. The ISCII document is produced a first draft of its Guidelines, called ___.
available as IS13194:1991 from the BIS offices. A. TEI P1
B. TEI D1
146. Unicode is standard related with ___. C. TEI G1
A. Character encoding in computer system D. TEI T1
B. Digital library system
C. Information retrieval system Answer: A (TEI P1)
D. Library classification
Notes: In 1990 the Text Encoding Initiative produced a
Answer: A (Character encoding in computer system) first draft of its Guidelines, called TEI P1 (Proposal 1).
The most recent version of the TEI Guidelines is known
147. Unicode is developed in __. as P5 that came out in 2007.
A. 1991
B. 1993 150. Which of the following associations have
C. 1995 sponsored the Text Encoding Initiatives (TEI) ?
D. 1997 a) ACL
b) ACRL
Answer: A (1991) c) ALLC
Notes: Unicode is developed by Unicode consortium d) ACH
based in California in 1991. It is a two-byte standard
A. a and b are correct
23 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

B. a, c and d are correct 153. In Binary number system, digit 7 is represented


C. c and d are correct by __.
D. a and c are correct A. 101
B. 001
Answer: B C. 111
D. 100
Notes: The Text Encoding Initiative (TEI) Consortium
is an international organization whose mission is to Answer: C (111)
Library Info

Library Info
develop and maintain guidelines for the digital encoding
of literary and linguistic texts. The Consortium publishes 154. In Binary number system, digit 9 is represented
the Text Encoding Initiative Guidelines for Electronic by:
Text Encoding and Interchange: an international and A. 1000
interdisciplinary standard that is widely used by B. 1001
libraries, museums, publishers, and individual scholars C. 1010
to represent all kinds of textual material for online D. 1011
research and teaching. The first draft (known as “P1”) of
the Guidelines published in June 1990 and latest P5 Answer: B (1001)
version of Guidelines came out in 2007. 155. Decimal number ‘100’ is represented in binary
151. Who among the following first proposed the as:
'hash coding'? A. 00100111
A. D. Ellis B. 11101100
B. H. P. Luhn C. 01010011
C. Mortimer Taube D. 1100100
D. Derek Austin Answer: D (1100100)
Answer: B (H. P. Luhn) 156. Which one is the correct ‘Binary number’ for
Notes: Hash codes are used in hashing, which is a way Decimal ‘115’?
to speed up access to an element in a table of data. The A. 1100011
idea of using hash-based searches was first proposed in B. 1010111
1953 by H. P. Luhn from IBM. C. 1111111
D. 1110011
152. Binary system of computers consists __.
A. Two digits Answer: D (1110011)
B. Four digits Notes: An easy method of converting decimal to binary
C. Six digits number equivalents is to write down the decimal number
D. Eight digits and to continually divide-by-2 (two) to give a result and
Answer: A (Two digits) a remainder of either a “1” or a “0” until the final result
equals zero.
Notes: Computers operates in binary which is a numeric
system that only uses two digits - 0 and 1. This means 157. In the binary system of numbers, 100 represent
they store data and perform calculations using only zeros the decimal number __.
and ones. A. 12
B. 7
C. 5

24 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

D. 4 161. Pascal Programming language was developed by


__.
Answer: D (4) A. Niklaus Wirth
158. Hexadecimal system uses which number as the B. Romain Bourdon
basis? C. Linus Tolward
D. Edgar F. Codd
A. 6
B. 8 Answer: A (Niklaus Wirth)
Library Info

Library Info
C. 10
D. 16 Notes: Pascal is an imperative and procedural
programming language, designed by Niklaus Wirth and
Answer: D (16) first appeared in 1970. It was named in honour of the
Notes: In the hexadecimal number system, the numbers French mathematician, philosopher and physicist Blaise
Pascal.
are represented with base 16. It is also pronounced
sometimes as 'hex'. 162. To make a program safe, one should take
The Decimal number, also called Hindu-Arabic number care of:
A. Strong authentication and access
system or Arabic number system, in mathematics,
controls
positional numeral system employing 10 as the base and
B. Error checking controls
uses 10 different numerals 0, 1, 2, 3, 4, 5, 6, 7, 8, 9.
C. Do risk analysis
The Octal number system is represented with base 8 D. Vendor’s credibility
and uses the digits 0 to 7.
Answer: A (Strong authentication and access
The Binary number is expressed in the base-2 numeral controls)
system and uses "0" (zero) and "1" (one).
163. Arrange the following according to their year of
159. SQL stands for __. development.
A. Selected Query Language a) Java
B. Source for Query List b) Visual Basic
C. Structured Query Language c) C++
D. Structure of Query Language d) COBOL

Answer: C (Structured Query Language)


A. (a), (d), (c) and (b)
Notes: SQL stands for Structured Query Language. It is B. (c), (a), (d), and (b)
a widely used programming language designed for C. (c), (d), (b) and (a)
working with Relational Database Management System. D. (d), (c), (b) and (a)

160. PHP stands for __. Answer: D


A. Personal Hypertext Processor
Notes: COBOL (1959); C++ (1985); Visual Basic
B. Pre Hypertext Protocol
(1991); JAVA (1995)
C. Programming Hypertext Preprocessor
D. PHP: Hypertext Preprocessor 164. Select the correct combinations:
a) Java – James A . Gosling
Answer: D (PHP: Hypertext Preprocessor)
b) C – Dennis Ritchie
c) Lisp – John McCarthy
25 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

d) Python – Guido van Rossum Notes: C++ is a general-purpose programming


A. a and d are correct language that was developed by Bjarne Stroustrup as an
B. b and c are correct extension of the C language. The first edition was
C. a and b are correct released in 1985.
D. All are correct
Answer: D 168. JAVA programming language was developed by
__.
Notes: Java (James A Gosling, 1995); C (Dennis A. Bjarne Stroustrup
Library Info

Library Info
Ritchie, 1971-73); Lisp (John McCarthy, 1958); Python B. Leonardo Chiariglione
(Guido van Rossum, 1989). C. Lou Montulli
D. James Gosling
165. COBOL stands for ___.
A. Common Business Oriented Language Answer: D (James Gosling)
B. Current Business Oriented Language
C. Current Business Oriental language Notes: Java is a general-purpose programming
D. Common Binary Oriented Language language that is class-based, object-oriented. It was first
developed by James Gosling at Sun Microsystems (later
Answer: A (Common Business Oriented Language) acquired by Oracle) in 1995.
Notes: COBOL is an acronym for COmmon Business 169. Visual Basic was developed by __.
Oriented Language. COBOL is a high-level A. Oracle Corporation
programming language very first developed by B. Sun Microsystems
CODASYL Committee (Conference on Data Systems C. Microsoft Corporation
Languages) in 1959. D. None of the above
166. Which of the following is not a programming Answer: C (Microsoft Corporation)
language?
A. ASCII Notes: Visual Basic is a third-generation event-driven
B. COBOL programming language from Microsoft, first released in
C. BASIC 1991.
D. FORTRAN
170. Which of the following is NOT a programming
Answer: A (ASCII) language?
A. ADA
Notes: ASCII (American Standard Code for Information B. PYTHON
Interchange), is a character encoding standard for C. LINUX
electronic communication. The first edition of the D. LISP
standard was published in 1963.
Answer: C (LINUX)
167. C++ was developed by __.
A. Bjarne Stroustrup 171. Which of the following programming
B. Leonardo Chiariglione language is exclusively used for Artificial
C. Lou Montulli Intelligence?
D. James Gosling A. C
B. J2EE
Answer: A (Bjarne Stroustrup) C. Prolog
D. JAVA

26 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

Answer: C (Prolog) B. Propagation


Notes: Prolog is a logic programming language C. Scattering
associated with artificial intelligence and computational D. Interruption
linguistics. It was first developed in 1972 by French Answer: A (Attenuation)
Scientists Alain Colmerauer and Robert Kowalski.
Notes: Attenuation refers to any reduction in the
172. Identify the fifth generation programming strength of a signal. It occurs with any type of signal,
Library Info

Library Info
languages from the following: whether digital or analog. It is a natural consequence of
a) Java signal transmission over long distances.
b) Mercury and OPS5 175. Which of the following is Asynchronous mode
c) PROLOG of communication?
d) SQL A. Instant messaging
A. a and b are correct B. Email
B. b and c are correct C. Video conferencing
C. c and d are correct D. Voip
D. a and c are correct
Answer: B (Email)
Answer: B
Notes: The term asynchronous is usually used to
Notes: While fourth-generation programming describe communications in which data can be
languages are based on algorithm written by transmitted intermittently (at regular intervals/not
programmer to build specific programs, fifth-generation continuously) rather than in a steady stream. In other
languages are constraint-based and logic programming, words, Asynchronous communications can be sent at
designed to make the computer solve a given problem any time without regard to whether or not the receiver is
without the programmer. Fifth-generation languages are ready. Asynchronous communication is sometimes
mainly used in artificial intelligence research. called start-stop transmission. Examples: Email,
OPS5 and Mercury and PROLOG are examples of Webforms, Discussion Forums, text messaging,
fifth-generation languages. Prolog, designed by Alain newsgroups, listservs (Mailing lists), blog, social media.
Colmerauer, Robert Kowalski is a logic
programming language associated with artificial 176. In which transmission mode, data is transmitted
intelligence. block by block?
A. Synchronous
173. What is Prolog? B. Digital
A. Logic Programming Language C. Asynchronous
B. Low-level Programming Language D. Analog
C. All of the above
D. None of the above Answer: A (Synchronous)

Answer: A (Logic Programming Language) 177. Which of the following is a synchronous


communication tool that can be used in e-
Telecommunications Fundamentals learning?
A. Emails
174. The loss in signal power as light travels down B. Mailing lists
the fiber is called __. C. Newsgroups
A. Attenuation
D. Instant Messaging
27 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

Answer: D (Instant Messaging) C. Full-duplex


D. Automatic
Notes: Synchronous communication can be defined as
Answer: A (Simplex)
real- time communication between two people. In this
communication, "data is sent in a continuous stream at 180. A television broadcast is an example of __
constant rate." Examples: Instant messaging, Chat, transmission.
Video Conferencing, Voice over IP, Telephone Calls, A. Simplex
Webcams. B. Half-duplex
Library Info

Library Info
C. Full duplex
178. The method of communication in which D. Automatic
transmission takes place in both the directions, but
Answer: A (Simplex)
only in one direction at a time is called:
A. Simplex 181. In ___ transmission, the channel capacity is
B. Full Duplex shared by both communicating devices at all
C. Half Duplex times.
D. Two Wire Circuits A. Simplex
B. Half-duplex
Answer: C (Half Duplex) C. Full-duplex
D. All the above
Notes: Transmission mode describes the direction and
flow of signal between two connected devices. There are Answer: C (Full-duplex)
three modes of transmission: Simplex, Half duplex, 182. Which transmission mode generally involves
and Full duplex. The main difference between simplex, dedicated circuits?
half duplex, and full duplex is that in a simplex mode of A. Simplex
transmission the communication is unidirectional (one- B. Half-duplex
way). Only one of the two devices on a link can C. Full-duplex
transmit, the other can only receive. Example: Radio & D. None of the above
Television Broadcasting, Computer to printer
Answer: A (Simplex)
communication
Notes: Simplex transmission generally involves
In the half-duplex mode of transmission the
dedicated circuits. Examples of simplex mode of
communication is two directional but the channel is
communications are: communication between a
alternately used by both the connected device. In other
computer and a keyboard, Loudspeaker system, Fire
words, in a half-duplex system, both parties can
alarm systems etc.
communicate with each other, but not simultaneously;
the communication is one direction at a time. Exa: 183. Satellite Communication works through __.
walkie-talkie . A. Radar
B. Transponder
On the other hand, in the full duplex mode of
C. Receptor
transmission, the communication is bi-directional, and
D. Transmitter
the channel is used by both the connected device
simultaneously. An example of a full-duplex device is Answer: B (Transponder)
a telephone.
Notes: A communications satellite's transponder is the
179. Communication between a computer and a
series of interconnected units that form a
keyboard involves __.
communications channel between the receiving and the
A. Simplex
B. Half-duplex
28 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

transmitting antennas. It is mainly used in satellite 187. In optical communication, multiplexing is


communication to transfer the received signals. referred to as ___.
A. FDM
184. In the communication satellite, which of the B. WDM
following is used to amplify and retransmit C. TDM
signals? D. CDMA
A. Transmitter
B. Transponder Answer: B (WDM)
Library Info

Library Info
C. Amplifier
D. De-amplifier Notes: In fiber-optic communications, wavelength-
division multiplexing (WDM) is a technology
Answer: B (Transponder) which multiplexes a number of optical carrier signals
onto a single optical fiber by using different
Notes: Transponder is a wireless communication device wavelengths (i.e., colors) of laser light. This technique
that upon receiving a signal, automatically retransmit the enables bidirectional communications over one strand of
signal at a different frequency. Transponders are fiber, as well as multiplication of capacity. In other
generally used in satellite communications and in words, A WDM system uses a multiplexer at
location, identification and navigation systems. the transmitter to join the several signals together and
185. GPS is a system that helps in locating positions a de-multiplexer at the receiver to split them apart.
with the help of __. 188. Which multiplexing technique transmits analog
A. Microwaves signals?
B. Satellites a) FDM
C. Police Intelligence b) TDM
D. Wireless Communication c) WDM
Answer: B (Satellites) d) STDM

Notes: The Global Positioning System (GPS), A. a and b are correct


originally Navstar GPS, is a satellite-based B. a, c and d are correct
radionavigation system owned by the United States C. b, c and d are correct
government and operated by the United States Space D. a and c are correct
Force. It was first launched in 1978.
Answer: D
186. The sharing of a medium and its link by two or
more devices is called ___. 189. Multiplexing is used in ___.
A. Full duplexing A. Packet switching
B. Multiplexing B. Circuit switching
C. Full duplexing and half duplexing C. Data switching
D. Half duplexing D. Packet switching and data switching

Answer: B (Multiplexing) Answer: B (Circuit Switching)

Notes: Multiplexing is a method using which one can Notes: When two nodes communicate with each other
send multiples signals through a shared medium at over a dedicated communication path, it is called
the same time. This helps in using less resources and circuit switching. There is a need of pre-specified route
thus saving the cost of sending messages. from which data will travels and no other data is
permitted. In circuit switching, to transfer the data,
29 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

circuit must be established in advance so that the data Answer: C (Packet Switching)
transfer can take place. Circuit switching was designed
for voice applications. Telephone is the best suitable Notes: Shortcomings of message switching gave birth to
example of circuit switching. Before a user can make a an idea of packet switching. The entire message is
call, a virtual path between caller and callee is broken down into smaller chunks called packets. The
established over the network. switching information is added in the header of each
packet and transmitted independently and reassembled
190. Which of the following is not a switching again at the destination. The internet uses packet
Library Info

Library Info
system? switching technique.
A. Packet
B. Circuit 193. Packet switching is __.
C. Router A. A store and forward switching system
D. Message B. A circuit switching system
C. An electro mechanical switching system
Answer: C (Router) D. A crossbar switching system

Notes: Switched communication networks are those in Answer: A (A store and forward switching system)
which data transferred from source to destination is
routed between various intermediate nodes. There are 3 Notes: Packet Switching uses Store and
common switching techniques: (i) Circuit Switching Forward technique while switching the packets. In
(ii)Message Switching, and (iii) Packet Switching telecommunications, store − and − forward packet
switching is a technique where the
191. Telegraph network is the example of __. data packets are stored in each intermediate node,
A. Packet switching before they are forwarded to the next node. The
B. Message switching intermediate node checks whether the packet is
C. Circuit switching error−free before transmitting, thus ensuring integrity of
D. None of the above the data packets.

Answer: B (Message Switching) 194. In which of the following mode each packet of a
message needs to follow the same path from a
Notes: In Message switching, the whole message is sender to receiver?
treated as single data unit and routed/transferred in its A. Circuit Switching
entirety from the source node to the destination node, B. Message switching
one hop at a time. During message routing, every C. A virtual approach to packet switching
intermediate switch in the network stores the whole D. Datagram approach to packet switching
message. If the entire network's resources are engaged
or the network becomes blocked, the message-switched Answer: D (Datagram approach to packet switching)
network stores and delays the message until ample
resources become available for effective transmission of 195. Telegraph Multiplexer was invented by __.
the message. Telegraph network for the transmission of A. S.F.B Morse
telegrams are the example of switching network. B. Emile Baudot
C. Graham Bell
192. Data transmission over Internet works on: D. Konrad Zuse
A. Circuit switching
B. Message switching Answer: B (Emile Baudot)
C. Packet switching
D. Stackable switching
30 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

Notes: Émile Baudot, French telegraph engineer and Whereas FDM (Frequency Division Multiplexing) and
inventor of the first means of digital communication WDM (Wavelength Division Multiplexing) are used
Baudot code, was one of the pioneers of for analog signals. TDM are of two types:
telecommunications. He invented a multiplexed printing Asynchronous TDM and Synchronous TDM. TDM is
telegraph system that used his code and allowed multiple used in applications like ISDN (Integrated Services
transmissions over a single line. Digital Network) and PSTN (Public Switched Telephone
Network).
196. The significant characteristic of an analogue
Library Info

Library Info
signal is ___. 200. Which of the following are features of ISDN?
A. It is discrete a) Second generation hyper media
B. It is continuous b) Web 2.0 technology
C. It transmits fast c) Suite of digital services
D. It has less noise d) Work in OSI model

Answer: B (It is continuous) A. c, and d are correct


197. Which analog multiplexing technique usually B. a, and c are correct
involves signals in the visible light frequencies? C. b and c are correct
A. FDM D. b and d are correct
B. TDM Answer: A
C. WDM
D. MDM Notes: ISDN is a circuit-switched telephone network
system, but it also provides access to packet switched
Answer: C (WDM) networks that allows digital transmission of voice and
198. Which analog multiplexing technique usually data. In the context of the OSI model, ISDN is
involves signals that are NOT in the visible light employed as the network in data-link and physical
frequencies? layers.
A. FDM 201. Which of the following are NOT the features of
B. TDM ISDN?
C. WDM a) Simultaneous digital transmission
D. MDM b) Set of communication standards
Answer: A (FDM) c) Creates and combines packets
d) Program to visit web pages
199. Which multiplexing technique used to transmit
digital signals? A. a and b are correct
A. FDM B. a, b and d are correct
B. WDM C. c and d are correct
C. TDM D. a and c are correct
D. FDM & WDM
Answer: C
Answer: C (TDM)
Notes: Integrated Services Digital Network (ISDN),
Notes: Multiplexers are used in both Analog and Digital first defined in 1988, is a set of communication
Multiplexing techniques. TDM (Time Division standards for simultaneous digital transmission of
Multiplexing) is a method used for digital signals. voice, video, data, and other network services over the

31 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

traditional circuits of the public switched telephone unshielded twisted pair (UTP) cabling is used for
network. variety of electronic communications. Twisted-pair
cabling was invented by Alexander Graham Bell in
202. Identify the statement that is NOT true about 1881.
ISDN:
A. ISDN is not limited to transmission of voice 206. PON is a system of __.
only A. Optical networks of computers
B. ISDN is simply a point-to-point solution like B. Cabling and signal to End User
Library Info

Library Info
a leased line C. Programmed Networks
C. ISDN is purely digital communication D. Passive Onsite Network
D. ISDN can provide simultaneous voice, video
and text transmission Answer: B (Cabling and signal to End User)

Answer: B (ISDN is simply a point-to-point solution Notes: A Passive Optical Network (PON) is a system
like a leased line) commonly used by telecommunications network
providers that brings fiber optic cabling and signals to
203. Which of the following are ISDN services? the end user. In other words, it is a fiber-optic
a) RSS telecommunications technology for delivering
b) Teletext broadband network access to end-customers.
c) Voice mail
d) Video conference 207. The process of converting digital signals into
A. a and b are correct analog signals is known as:
B. a, b and d are correct A. Conversion
C. b, c and d are correct B. Multiplexing
D. a and c are correct C. Demodulation
D. Modulation
Answer: C
Answer: D (Modulation)
204. Optic fibres are made of __.
A. Fine glass stands Notes: Modem (Modulator-Demodulator) performs two
B. Copper Wires operations: (i) Modulation - converting digital signals
C. Alloy into analog (ii) Demodulation - Receiving analog signals
D. Polyester strings and converting back into digital signals.
Answer: A (Fine glass stands)
208. In context to modulation, PCM stands for ___.
205. Twisted pair cable have maximum segment A. Pulse Code Modulation
length: B. Phase Control Modulation
A. 50 m C. Popular Code Modulation
B. 10 m D. Penultimate Code Modulation
C. 1000 m
Answer: A (Pulse Code Modulation)
D. 100 m
Notes: Pulse-code modulation is a method used to
Answer: D (100 m)
digitally represent sampled analog signals. It is the
Notes: The unshielded twisted pair cables can standard form of digital audio in computers, compact
have maximum segment length of 100 meters. The

32 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

discs, digital telephony and other digital audio 212. Which one of the following is the IEEE standard
applications. for Wimax?
A. IEEE 802.3
B. IEEE 802.11
209. Demodulation is a process of __.
C. IEEE 802.15
A. Converting analog to digital signals
B. Converting digital to analog signals D. IEEE 802.16
C. Multiplexing various signals into one high
Answer: D (IEEE 802.16)
Library Info

Library Info
speed line signals
D. Performing data description
213. Which of the following standard is a part of
Answer: A (Converting analog to digital signals) networking protocols?
A. IEEE 804.2X
B. IEEE 803.3X
210. What is meant by Session Initiation Protocol C. IEEE 802.1X
(SIP)? D. IEEE 801.2X
A. Communication protocol for signaling
B. Offers end to end pocket delivery Answer: C (IEEE 802.1X)
C. Transmits data as datagram
214. The technology that allows a phone call to be
D. Copy files from one host to another
routed over network wires is __.
Answer: A (Communication protocol for signaling) A. VOIP
B. Tele conferencing
Notes: The Session Initiation Protocol (SIP) is C. Video Conferencing
a signaling protocol used for initiating, maintaining, and D. Fast Ethernet
terminating real-time sessions that include voice, video
and messaging applications. SIP is used for signaling and Answer: A (VOIP)
controlling multimedia communication sessions in
215. Identify the odd one out:
applications of Internet telephony for voice and video
A. Bluetooth
calls, in private IP telephone systems, in instant
B. RFID
messaging over Internet Protocol (IP) networks as well
C. VSAT
as mobile phone calling over LTE (VoLTE).
D. Wi-Fi
211. WIMAX stands for __.
Answer: C (VSAT)
A. Worldwide Interoperability for Microwave
Access 216. Which of the following technologies use
B. Wireless Internet for Multi Access electronic waves at radio frequency for data
C. WiFi Internet Microwave Access transmission?
D. Whatsapp Interface for Multiple Access A. Li-fi
B. Wi-fi
Answer: A (Worldwide Interoperability for
C. Optical cables
Microwave Access)
D. Twisted pairs
Notes: WiMAX (Worldwide Interoperability for
Answer: B (Wi-fi)
Microwave Access) is a family of wireless
broadband communication standards based on the IEEE Notes: Wi-Fi (Wireless Fidelity) is a family of wireless
802.16 set of standards. network protocols, based on the IEEE 802.11 family of
standards, which are commonly used for local area
33 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

networking of devices and Internet access. Wi-Fi is a 220. Bluetooth is the wireless technology for __.
trademark of the non-profit Wi-Fi Alliance, founded in A. Local area network
1999. B. Personal area network
C. Broadcast network
217. Who is considered as the ‘Father of Wi-Fi’? D. Metropolitan area network
A. Tim Berners Lee
B. Vic Hayess Answer: B (Personal area network)
C. Seymour Roger Cray
Library Info

Library Info
D. L. J. Cook Notes: Bluetooth is a wireless technology used for
building Personal Area Network (PANs) for exchanging
Answer: B (Vic Hayes) data between fixed and mobile devices over short
distances using short-wavelength UHF radio waves. The
Notes: Vic Hayes is considered as the “father of WiFi” development of Bluetooth was initiated in 1989 by Nils
because he chaired the committee who introduced the Rydbeck, CTO at Ericsson Mobile.
concept of an international standard for wireless
networking, known as the IEEE 802.11 standard. 221. Identify unguided media of telecommunication
from the following:
218. A Wi-fi network uses __ waves to transmit a) Optical fibre cable
signals? b) Infrared
A. Mechanical c) Microwave
B. Radio d) Co-Axial Cable
C. Sound A. a and b are correct
D. Light B. a, b and d are correct
C. b, c and d are correct
Answer: B (Radio)
D. b and c are correct
219. Li-Fi stands for __.
Answer: D
A. Light Fidelity
B. Low Fidelity Notes: An unguided transmission transmits the
C. Large Fidelity electromagnetic waves without using any physical
D. Loss Fidelity medium. Therefore it is also known as wireless
transmission. Unguided transmission is broadly
Answer: A (Light Fidelity)
classified into three categories: (i) Radio waves (ii)
Notes: Li-Fi (Light Fidelity) is wireless Microwaves, and (iii) Infrared.
communication technology, which utilizes light to
222. Facsimile transmission is ___.
transmit data between devices. The term was first
introduced by Harald Haas in 2011. In technical terms, A. Transmission of micro-films
Li-Fi is a light communication system that is capable of B. Transmission of magnetic tapes
transmitting data at high speeds over the visible C. Transmission of telegraphic codes
D. Transmission of documents
light, ultraviolet, and infrared spectrums. However,
Wi-fi is a family of wireless networking technologies, Answer: D (Transmission of documents)
based on the IEEE 802.11 family of standards, which
are commonly used for local area networking of devices 223. What is called a measure of the amount of
and Internet access. Wi-Fi is a trademark of the non- information that can be transmitted in a given
profit Wi-Fi Alliance. In contrast to Li-Fi, it uses Radio time?
waves to transmit data between devices. A. Speed
34 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

B. Rate B. The amount of data in the multimedia file


C. Bandwidth C. The speed of transmission of data
D. Frequencies D. Number of bands available in the computer

Answer: C (Bandwidth) Answer: A

Notes: The maximum amount of data transmitted over Notes: In computing, bandwidth is the maximum
an internet connection in a given amount of time. It is amount of data transfer across a given path. It measures
Library Info

Library Info
measured in bits per second. how much data (capacity of wired or wireless network)
can be sent over a specific connection in a given amount
224. What is the unit of the rate of communication of time. Bandwidth is not a measure of network
data on the channel? speed.
A. pbs
B. bps 227. ‘BAUD’ rate means __.
C. bsp A. The number of bits transmitted per unit time
D. bbs B. The number of bytes transmitted per unit
time
Answer: B (bps) C. The rate at which the signal changes
Notes: Bps is a unit used for measuring the speed of D. None of the above
transmission of data on a network of computers – that is Answer: C (The rate at which the signal changes)
the amount of information sent or received in a given
amount of time. A bit is a single unit of digital Notes: Bit rate and Baud rate, are terms that often used
information, represented by either a 1 or a 0. The total in data communication. Bit rate is simply the number of
number of bits per second (bps) that can be transmitted bits (i.e., 0’s and 1’s) transmitted per unit time. While
over a network link represents the bandwidth of that Baud rate is the number of signal units transmitted
link. per unit time that is needed to represent those bits.

225. In the context of Information transmission, the 228. Unit for measuring speed of data transmission is
term ‘bandwidth’ denotes: ___.
A. A protocol A. Bit rate
B. Network topology B. Baud rate
C. Channel capacity C. Cycle rate
D. Transmission media D. Jet rate

Answer: C (Channel Capacity) Answer: A (Bit rate)

Notes: Bandwidth refers to ‘channel capacity’. In other Notes: The speed with which data is getting transmitted
words, Network bandwidth is the capacity of a wired or in computer is called data transmission speed. It is
wireless network communications link to transmit commonly measured in bits per second. To be more
the maximum amount of data from one point to specific, it is measured in megabits (million bits)
another over a computer network or internet connection per second which is usually abbreviated as Mbps.
in a given amount of time -- usually, per second.
229. Which of the following is used to represent the
226. The term ‘Bandwidth’ refers to ______. speed of a processor?
A. The amount of data that can be sent through A. Mbps
communication media B. Kilo Bytes

35 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

C. FLOPS A. 1928
D. Word Length B. 1982
C. 1984
Answer: C (FLOPS) D. 1974
Notes: FLOPS (FLoating point Operations Per Answer: B (1982)
Second) is a measure of the speed of a computer in
operations per second, especially arithmetic operations 234. Who invented OSI Model in 1982 __.
Library Info

Library Info
involving floating-point numbers. A. BSO
B. ISI
Computer Networks Fundamentals C. Indian Standard Organisation
D. International Standard Organisation
230. Which of the following are example s of WAN?
a) DELNET Answer: D (International Standard Organisation)
b) CALIBNET
c) PUNENET Notes: The seven layers of OSI Model are: Physical
d) INFLIBNET Layer, Data Link Layer, Network Layer, Transport
Layer, Session Layer, Presentation Layer, and
A. a, and d are correct Application Layer
B. a, b and c are correct
235. Who are associated with the development of OSI
C. b, c and d are correct
Model?
D. a, b, c, and d are correct
a) Charles Bachman
Answer: A b) ISO
c) MIT, USA
231. Working of the WAN generally involves__. d) UCLA, California
A. Telephone lines A. a and b are correct
B. Satellites B. a, b and d are correct
C. Microwaves C. c and d are correct
D. All the above D. a and c are correct

Answer: B (Satellites) Answer: A

Notes: A Wide Area Network (WAN) is a data network, Notes: The Open Systems Interconnection
usually used for connecting computers, that spans a wide model (OSI model) is a conceptual model that
geographical area. WANs can be used to connect cities, characterizes and standardizes the communication
states, or even countries. functions of a telecommunication or computing system.
The model is a product of the Open Systems
232. Open System Interconnection (OSI) is related to Interconnection project at the International
__. Organization for Standardization (ISO). The standard
A. Indexing Rules is usually referred to as Open Systems Interconnection
B. Operating System Reference Model, OSI Reference Model, or simply OSI
C. Communication protocols model and was published in 1984 as the ISO 7498. OSI
D. Database Design had two major components- the Basic Reference Model
Answer: C (Communication protocols) or seven-layer model given by Charles Bachman, and a
set of specific protocols.
233. Which year was OSI introduced?
36 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

236. Open Systems Interconnection (OSI) model was


an effort to ___. Notes: This layer includes the physical equipment
A. Standardize networking involved in the data transfer, such as the cables and
switches. This is also the layer where the data gets
B. Provide internet connectivity
converted into a bit stream, which is a string of 1s and
C. Provide E-mails 0s. In short, this layer provides a physical medium
D. Standardize bibliographic description through which bits are transmitted.
Answer: A (Standardize Networking) 240. Transmission data rate is decided by __.
Library Info

Library Info
A. Network layer
237. Arrange the following layers of networking of B. Data Link layer
OSI model in the sequence of their functioning: C. Physical layer
a) Network layer D. Transport layer
b) Physical layer
c) Transport layer Answer: C (Physical layer)
d) Data Link layer
Notes: Physical layer is a layer 1 device which deals
with network cables or the standards in use like
A. (a), (b), (c) and (d) connectors, pins, electric current used etc. Basically the
B. (c), (a), (d), and (b) transmission speed is determined by the cables and
C. (c), (d), (b) and (a) connectors used. Hence it is physical layer that
D. (b), (d), (a) and (c) determines the transmission speed in network.

Answer: D 241. For faster communication of data ___ is used.


A. Microwave transmission
Notes: The Open Systems Interconnection (OSI) model B. Optical fiber
was developed by International Organization for C. Coaxial cable
Standardization (ISO). The Seven Layers of OSI D. Free transmission
Model from lowest are: 1. Physical Layer, 2. Data Link
Layer 3. Network Layer 4. Transport Layer 5. Session Answer: B (Optical fiber)
Layer 6. Presentation Layer, and 7. Application Layer.
Physical Layer is the lowest layer in the model. 242. In OSI model which layer is in between Physical
layer and Network layer?
238. The Physical layer concerns with __. A. Data link layer
A. Bit-by-bit delivery B. Transport layer
B. Process to process delivery C. Presentation layer
C. Application to Application delivery D. Session layer
D. None of the above
Answer: A (Data link layer)
Answer: A (Bit by bit delivery)
243. OSI Layer that is responsible for transferring
frames is __.
239. OSI Layer that is used to deal with the A. Application layer
mechanical and electrical specifications is __. B. Presentation layer
A. Physical layer C. Data Link Layer
B. Data Link layer D. Session Layer
C. Network layer
D. Transport layer Answer: C (Data Link Layer)

Answer: A (Physical layer)

37 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

244. In which layer MAC address of a computer is


assigned to network interface? 249. Segmentation and reassembly is the
A. Physical layer responsibility of __.
A. Presentation layer
B. Data Link Layer
B. Session layer
C. Network Layer C. Transport layer
D. Transport Layer D. Network layer
Answer: B (Data Link Layer) Answer: C (Transport layer)
Library Info

Library Info
245. Which of the following tasks is not done by data Notes: Transport layer is responsible for end to end
link layer? communication between the two devices. It takes data
A. Framing from the session layer and breaks it into segments before
B. Error control sending it to Network layer. Transport layer working on
C. Flow control receiving device is responsible for reassembling of the
D. Channel coding segments into data the session layer can consume.
Answer: D (Channel coding)
250. Which layer links the network support layers
Notes: Data-link layer is responsible for implementation and user support layers?
A. Transport Layer
of point-to-point flow and error control mechanism.
B. Session Layer
Data-link layer uses the techniques of error control C. Data Link Layer
simply to ensure and confirm that all the data frames or D. Network Layer
packets are transmitted or transferred from sender to
receiver with certain accuracy. Answer: A (Transport Layer)

246. In OSI model, network layer is ___. Notes: Physical, data link and network layers are
A. The topmost layer network support layers and session, presentation and
B. Just above the Transport Layer application layers are user support layers. Transport
C. Just above the Physical Layer layer is in the middle that links them.
D. Just above the Data link Layer
251. Which layer of the OSI model is mostly
Answer: D (Just above the Data link Layer) concerned with the syntax of the data?
A. Session layer
247. The Network layer concerns with __. B. Presentation layer
A. Frames C. Network layer
B. Bits D. Data link layer
C. Packets
D. None of the above Answer: B (Presentation Layer)

Answer: C (Packets) Notes: This layer, also called syntax layer, is primarily
responsible for making the data presentable for
248. In Network layer, the data packet uses __ of applications to consume. The functions of this layer are
devices to transfer data.
data representation, encryption and decryption,
A. MAC address
B. IP address converting machine dependent data to machine
C. URL independent data and compression of data.
D. PURL
252. In OSI model, dialogue control and token
Answer: B (IP address) management are responsibilities of __.
38 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

A. Application layer
B. Data Link layer 256. A router ___.
C. Session layer A. Forward data packets between
D. Presentation layer telecommunication networks
B. Receives a signal and retransmits it at a
Answer: C (Session layer)
higher level
Notes: Session layer, also known as a network dialog C. Helps in interfacing with another network
D. Essentially translates protocols
Library Info

Library Info
controller, is responsible for creating, maintaining,
synchronizing the interaction between communicating
Answer: A
applications. This layer allows two systems to start
communication with each other in half-duplex or full- Notes: A router is a device that connect multiple
duplex. Thus, the session layer establishes, controls, and networks (two LANs or WANs or a LAN and its ISP’s
ends sessions occurring between communicative network) and forward data packets destined either for its
applications. own networks or other networks. Router operates in
network layer of OSI model and transmits data in the
253. Which of the following facets are associated form of packets whereas bridge operates in data link
with the session layer?
layer of OSI model and transmits data in the form of
a) Dialog control
b) Token management frames. Bridge has only two ports (single input and
c) Semantics of the information transmitted single output port) and reads the MAC address of a
d) Synchronization device whereas router has more ports compare to a
A. a, b, and d are correct bridge and reads the IP address of a device.
B. a, c and d are correct
C. a and d are correct Devices used in each layer are as follows:
D. b and d are correct Application layer: Gateways, Firewalls, all end devices
like PC’s, Phones, Servers.
Answer: A Presentation layer : Gateways, Firewalls, PC’s.
Session layer: Gateways, Firewalls, PC’s.
254. Identify the top most layer of the OSI model Transport layer: Gateways, Firewalls.
Network layer: Routers, Brouters, 3-layer switches.
among the following:
Data-link layer: Bridges, Modems, Network cards, 2-
A. Network Layer layer switches.
B. Transport Layer Physical layer or below: Hubs, Repeaters, Cables,
C. Presentation Layer Fibers, Wireless.
D. Application Layer
257. Which of the following devices is used to
Answer: D (Application Layer) connect different network segments and manage
the traffic between them?
255. Which layer provides services to users?
A. Switch
A. Application layer
B. Presentation layer B. Gateway
C. Session layer C. Bridge
D. Data Link layer D. Repeater

Answer: A (Application layer) Answer: C (Bridge)

Notes: In networking, a user mainly interacts with Notes: Repeater regenerates data and used to increase
application layer to create, send and receive information the length of network whereas bridge is used for traffic
to/from other computer or network.
39 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

filtering.... i.e. for dividing a larger network into multiple C. a and d are correct
segments. D. a, b, c, and d are correct

258. LANs are distinguished from other types of Answer: D


Networks by the following characteristics :
a) Full time connectivity to local service. 261. The device that is required to translate digital
signals into analogue form and back again is
b) Unlimited geographic operation.
called a __.
c) Data transfer rate
Library Info

Library Info
A. Modem
d) Low cost and cabling transmission media. B. Router
C. Connector
A. a, b, and c are correct D. Switch
B. c, b and d are correct
C. a, c, and d are correct Answer: A (Modem)
D. c, a and b are correct
Notes: Modem (modulator-demodulator) is a
hardware device that converts data into a format suitable
Answer: C
for a transmission medium so that it can be transmitted
259. LANs (Local Area Networks) can be connected from one computer to another. A modem modulates one
or more carrier wave signals to encode digital
by device called:
information for transmission and demodulates signals to
A. Bridges decode the transmitted information. The goal is to
B. Routers produce a signal that can be transmitted easily and
C. Modems decoded reliably to reproduce the original digital data.
D. Ethernet Cards
262. Device which is used to connect computer with
Answer: A (Bridges) telephone line for internet connection is called __.
A. Hard Disc
Notes: In telecommunication networks, a bridge is a B. Pen Drive
product that connects a local area network (LAN) to C. MODEM
another Local Area Network (LAN) that uses the same D. Compact Disc
protocol. In other words, a bridge is a type of computer
Answer: C (MODEM)
network device that provides interconnection with
other bridge networks that use the same protocol. 263. Select the correct statements:
Bridge devices work at the data link layer of the Open A. Modem works at Data Link Layer whereas
System Interconnect (OSI) model, connecting two Router works at Network Layer
different networks together and providing B. Modem contains two ports only, whereas
communication between them. Router contains multiple ports
C. Modem can work independently without a
260. Select the correct combinations: router, but router needs a modem to
a) Repeaters – Helps in strengthening the establish connections
signals D. All are correct
b) Gateways – Allows dissimilar networks to
communicate Answer: D
c) Routers – Allows similar networks to
communicate Notes: Modem (Modulator-demodulator) is a
d) Switches – Allows data to be transferred hardware device that converts digital signals into
within the network analogue form and back again to facilitate
A. a, b, and d are correct transmission.The purpose is to produce a signal that can
B. a, c and d are correct
40 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

be transmitted easily and decoded to reproduce the 266. In computing, a device that connects one
original digital data. network to another for the purpose of file
transfer is known as __.
A router is also a hardware device that connects A. Superway
multiple networks (two LANs or WANs or a LAN and
B. Search Engine
its ISP’s network) and forward data packets destined
either for its own networks or other networks. C. High way
D. Gateway
A modem helps you to connect to the internet. It is
Library Info

Library Info
associated with your ISP (Internet Service Provider) Answer: D (Gateway)
and to a computer. Whereas a router associated with
your modem, gives you a chance to share your internet Notes: A gateway is a networking hardware used in
with different devices around you. There is also an in- telecommunication networks that allows data to flow
built security system to prevent it from hackers.
from one discrete/distinct network to another.
264. In data transfer process, which of the following
is used for strengthening the signals? 267. Which of the following may contain devices
A. Hubs such as protocol translators?
B. Repeater A. Routers
C. Switching packets B. Concentrators
D. Firewalls C. Gateway
D. Repeater
Answer: B (Repeater)
Answer: C (Gateway)
Notes: A repeater is an electronic device in a
communication channel that receives a signal, increases Notes: A gateway is a piece of networking
its power and retransmits it, allowing it to travel further hardware used in telecommunications networks that
so that the signal can cover longer distances or be allows data to flow from one discrete network to
received on the other side of an obstruction. An another. In another words, it allows dissimilar
important point to be noted about repeaters is that they networks to communicate. Gateways are distinct
do not amplify the signal. When the signal becomes from routers or switches in that they communicate
weak, they copy the signal bit by bit and regenerate it at using a more than one protocol to connect a bunch of
the original strength by taking high input power and networks and can operate at any of the seven layers of
providing low output power. Repeater is a 2 port device the OSI model. A network gateway provides
and operates under Physical Layer. interoperability between networks and contains
devices, such as protocol translators, impedance
265. A repeater in a communication network helps a matchers, rate converters, fault isolators,
weakened or corrupted signal to: or signal translators.
A. Amplify
B. Regenerate 268. The function of Firewall is to ___.
C. Resample A. Open parts to all IP
D. Reroute B. Enable user privacy
C. Enable anonymous surfing
Answer: B (Regenerate) D. Filter the IP Packets

Notes: A repeater work in the physical layer. It takes the Answer: D (Filter the IP Packets)
weakened, corrupted signal and regenerates the signal bit
by bit. Notes: In computing, a firewall is a network security
system that monitors and controls incoming and
41 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

outgoing network traffic based on predetermined Answer: C (Multiple ports)


security rules. It acts as a packet filter that inspects all
packets transferred between computers. Notes: A hub is basically a multiport repeater works
on the Physical layer of OSI model. A hub connects
269. Select the correct options about Amplifier: multiple wires coming from different branches, for
a) Amplifier takes low input power and example, the connector in star topology which connects
provides high output power. different stations. Hubs cannot filter data, so data
b) Amplifier is an electronic device having 4 packets are sent to all connected devices. In other
Library Info

Library Info
ports words, collision domain of all hosts connected through
c) Amplifier increases the amplitude of the Hub remains one. Also, they do not have intelligence to
signal with the noise find out best path for data packets which leads to
d) Amplifier is used in wireless inefficiencies and wastage.
communication.
A. a, b, and d are correct 271. How many layers are there in TCP/IP Model?
B. a, c and d are correct A. 2
C. a and d are correct B. 4
D. b and d are correct C. 5
D. 7
Answer: B
Answer: B (4)
Notes: Amplifier is used for increasing the amplitude
or strength of the signal, if the previously transmit Notes: TCP/IP, or the Transmission Control
signal is found weak. It uses electric power from Protocol/Internet Protocol, is a suite of
a power supply to increase the amplitude of a signal communication protocols used to interconnect network
applied to its input terminals, producing a proportionally devices on the internet. The Defense Advanced Research
greater amplitude signal at its output. Some important Projects Agency (DARPA), the research branch of the
difference between Repeater and Amplifier are: (i) U.S. Department of Defense, created the TCP/IP model
Repeater takes high input power and provides low output in the 1970s for use in ARPANET, a wide area network
power, whereas Amplifier takes low input power and that preceded the internet. The TCP/IP model, also
provides high output power. (ii) Repeater is generally called DoD model, is a concise version of the OSI
used in static (stationary) environment whereas model. It originally contains four layers, unlike seven
Amplifier is generally used in Mobile and Remote area layers in the OSI model. The layers are: (i)
network. (iii) Repeater regenerates the signal so that the Process/Application Layer (ii) Host-to-Host/Transport
noise can be reduced or eliminated whereas Amplifier Layer (iii) Internet Layer, and (iv) Network Access/Link
increases the amplitude of the signal with the noise. (iv) Layer.
Repeater works on the physical layer of OSI model 272. Which layers in the OSI model is equivalent to
whereas Generally Amplifier is used in wireless
the Process/Application layer of TCP/IP model?
communication. However, both are electronic devices,
A. Application layer
having 2 ports. B. Presentation layer
270. Hubs are networking device having __. C. Session layer
A. One port D. All the above
B. Two ports Answer: D (All the above)
C. Multiple ports
D. None of the above Notes: Process/Application layer is the top most layer of
four layer TCP/IP model. It combines the functions of
42 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

Application layer, Presentation layer and Session 276. Which layers in the OSI model is equivalent to
layer of OSI model. Its protocols include the Hypertext the Network Process/Link layer of TCP/IP model?
Transfer Protocol (HTTP), File Transfer Protocol (FTP), A. Physical layer
Post Office Protocol 3 (POP3), Simple Mail Transfer B. Data Link layer
Protocol (SMTP) and Simple Network Management C. Both A and B
Protocol (SNMP). D. None of the above

273. What layer in the TCP/IP model is equivalent to Answer: C (Both A and B)
Library Info

Library Info
the Transport layer of the OSI model?
A. Process/Application layer Notes: Network Process/Link layer is the lowest layer
B. Host-to-Host layer (First layer) in the TCP/IP model. It combines the
C. Internet layer functions of Data link layer and Physical layer of OSI
D. Network Access/Link Layer model. The protocols in this layer include Ethernet for
local area networks (LANs).
Answer: B (Host-to-Host Layer)
277. The TCP/IP layer that is responsible for
Notes: The Host-to-Host layer is equivalent to the providing the communication and packet services
Transport layer of the OSI model. It is the third layer in is the __.
TCP/IP model. The protocols in this layer include TCP A. Transport Layer
and UDP. B. Internet Layer
C. Application Layer
274. Which layers of the OSI reference model are D. Data Link Layer
host to host layers?
a) Transport layer Answer: A (Transport Layer)
b) Network layer
c) Session layer 278. Common network topologies are__.
d) Data Link Layer A. Bus and Ring
A. a and b
B. Mesh and Ring
B. a, and c
C. Star
C. b and c
D. Both A and C
D. c and d
Answer: D (Both A and C)
Answer: B
279. Bus, ring and star topologies are mostly used in
275. Which layer in the TCP/IP model is equivalent
__.
to the Network layer of OSI model?
A. LAN
A. Process/Application layer
B. MAN
B. Host-to-Host layer
C. WAN
C. Internet layer
D. None of the above
D. Network Access/Link Layer
Answer: A (LAN)
Answer: C (Internet Layer)
280. The geographical arrangement of computer
Notes: The Internet layer is equivalent to the Network
resources, remote devices and communication
layer of the OSI model. It is the second layer in TCP/IP
facilities in a network system is called:
model. The protocols in this layer include IP and the
A. Network analysis
Internet Control Message Protocol (ICMP), which is
B. Network system
used for error reporting.
43 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

C. Network topology 285. Which network topology is considered passive?


D. Network of networks A. Star
B. Bus
Answer: C (Network topology) C. Ring
281. How different nodes in a network are connected D. Mesh
and how they communicate are determined? Answer: B (Bus)
A. By Network connectivity
Library Info

Library Info
B. By Network topology 286. In which topology, the most flexibility in how
C. By Network Compatibility devices are wired is possible?
D. None of the above A. Bus networks
B. Star networks
Answer: B (By Network Topology) C. Ring networks
282. The topology in which the ends of the network D. None of the above
wires are connected to terminators is : Answer: A (Bus networks)
A. Star
B. Bus 287. Which topology has the toughest fault
C. Hybrid identification?
D. Mesh A. Mesh
B. Star
Answer: B (Bus) C. Bus
Notes: A bus topology is a topology for a Local D. Ring
Area Network (LAN) in which all the nodes are Answer: C (Bus)
connected to a single cable called ‘Backbone cable’.. At
each end of the cable a terminator is fitted to stop signals 288. Which topology requires multipoint
reflecting back down the bus. connections?
A. Mesh
283. Terminators are used in __ topology? B. Bus
A. Star C. Star
B. Ring D. Ring
C. Bus
D. None of the above Answer: B (Bus)

Answer: C (Bus) Notes: In bus topology, there is a single cable to which


all the network nodes are connected. So whenever a
284. In which topology, if the computer cable is node tries to send a message or data to other nodes, this
broken, networks broke down? data passes through all other nodes in the network. In
A. Bus this topology, it is easy to connect computer or
B. Ring peripherals and also it requires less cable than a star
C. Star topology. Terminators are required at both ends of the
D. None of the above backbone cable. Entire network shuts down if there is a
break in the main cable and also it is difficult to identify
Answer: A (Bus)
the problem if the entire network shuts down. However,
Notes: Computer cable in a bus topology is called failure of one computer does not affect the rest of the
Backbone cable. network.
44 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

289. For large networks, which topology is used? uses token to pass the information from computer to
A. Bus another. A large Ring topology network uses a number
B. Star of repeaters, because if someone wants to send some
C. Ring data to the last node, the data will have to pass through
D. None of the above all the other nodes in the network to reach the
destination. Hence, to prevent data loss repeaters are
Answer: B (Star) used in the network to boost signals and send the token
Library Info

Library Info
290. A Central controller or a hub is a feature of __. and data to the next node. The transmission of data in
A. Star Topology this network is unidirectional as bit by bit in a
B. Mesh Topology sequential manner. In ring topology, all the computers
have equal access to the network. However, failure of
C. Ring Topology
one computer can affect the whole network and also
D. Bus Topology
adding and removing computers disturbs the network.
Answer: A (Star Topology) Furthermore, in order for all computers to communicate
with each other, all computers must be turned on. Thus,
Notes: A star topology is a topology for a Local troubleshoot is difficult in the ring network. Ring
Area Network (LAN) in which all nodes are individually network is highly dependent on wire which connects
connected to a central connection point, like a hub or a different components. Generally Rings are implemented
switch. Easy to install and maintain as new nodes can be using twisted pair and fiber-optic cable. The ring is
added and removed to and from the central hub without classified as an active topology because there is no
affecting the network. A star topology is costly because termination point in the ring.
it takes more cable than bus topology but the benefit is
that if a cable fails, only one node will be brought down. 293. Which among the following is considered
However, because of its dependency on hub, if hub fails, ‘Active topology’?
the entire network breaks down. A. Bus topology
B. Ring topology
291. The network topology in which nodes are C. Star topology
connected to a central hub is known as: D. All the above
A. Ring Topology
B. Bus Topology Answer: B (Ring topology)
C. Star Topology
Notes: The Ring topology is classified as an active
D. Mesh Topology
topology because there is no termination point in the
Answer: C (Star Topology) ring.

292. Flow of data in a ring topology is __. 294. In computer network, short message that travels
A. Unidirectional around the communication medium is called _.
B. Bi-directional A. Ring
C. Duplex B. Baud
D. None of the above C. Mesh
D. Token
Answer: A (Unidirectional)
Answer: D (Token)
Notes: In Ring topology, each computer is connected to
the next computer and the last computer is connected to 295. In Ring Topology, the data can be transmitted
the first, making a ring shape of computer network. It only if the computer possesses __.

45 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

A. Token b) Ring Network Topology


B. Packet c) Multiple Ring Network Topology
C. Data d) Star Network Topology
D. Access Method
A. a and b are correct
Answer: A (Token) B. a, c and d are correct
Notes: In networking, a token is a series of bits that C. b and d are correct
Library Info

Library Info
circulate on a token-ring network. When one of the D. a and c are correct
systems on the network has the "token," it can send Answer: C
information to the other computers. Since there is only
one token for each token-ring network, only one 299. Which network topology is most likely to
computer can send data at a time. contain multiple hubs?
A. Ring topology
296. FDDI is a ___. B. Star topology
A. Bus Network C. Tree topology
B. Ring Network D. Mesh topology
C. Mesh Network
D. Star Network Answer: C (Tree topology)

Answer: B (Ring Network) Notes: Tree topology is a variation of star topology.


Tree topology consists of multiple hubs, one is primary
Notes: Fiber Distributed Data Interface (FDDI) is a hub and remaining are secondary hubs.
standard for data transmission in a local area network. It
uses optical fiber as its standard underlying physical 300. How are the computers linked in tree topology?
medium. A FDDI network contains two rings, one as a A. All computers are linked directly
secondary backup in case the primary ring fails. B. All computers are linked together
C. All computers are linked indirectly
297. PSDN stands for __. D. All computers are linked hierarchically
A. Public Switched Data Network
B. Private Switched Data Network Answer: D (All computers are linked hierarchically)
C. Pilot Switched Data Network
D. Popular Switched Data Network 301. Select the correct combinations:
a) Bus topology – Nodes connected to
Answer: A (Public Switched Data Network) backbone
b) Star topology – Nodes connected to hub
Notes: A public switched data network (PSDN) is a c) Ring topology – Each node connected to the
network for providing data services via a system of next
multiple wide-area networks. It is an alternate to WAN. d) Mesh topology – Each node connected to
A PSDN may use a variety of switching technologies, every other
including packet switching, circuit switching, A. c, and d are correct
and message switching. Sometimes it is also called B. a, and c are correct
packet-switched data network. C. b and c are correct
D. a, b, c, and d are correct
298. Which topology of computer network provides
faster server access? Answer: D
a) Bus Network Topology

46 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

302. The Topology with highest reliability is____. 305. The network topology that supports bi-
A. Bus Topology directional links between each possible node is __.
B. Star Topology A. Tree
C. Ring Topology B. Star
D. Mesh Topology C. Mesh
D. Ring
Answer: D (Mesh Topology)
Answer: C (Mesh)
Library Info

Library Info
Notes: In the mesh topology each computer is connected
to each of the other computers. If you have six 306. ‘Jitter’ refers to __.
computers you would need five network cards in each A. Errorless delivery
computer to connect to all the other computers in the B. Variation in the packet arrival time
LAN. To add computers to the network you would have C. Timely delivery of message
to add a cable run and a network card to each computer. D. None of the above
This topology requires the most cable and hardware to
keep the network running that makes it the most Answer: B (Variation in the packet arrival time)
expensive. However, on the plus side, if any link or Notes: Jitter, or network jitter, is the variance in time
computer goes down there are always multiple paths to delay in milliseconds (ms) between data packets over
get the data through. It also ensures the data privacy and
a network. It is a disruption in the normal sequence of
security, because every message travels along a
sending data packets. The technical term for jitter is
dedicated link. This makes the topology most robust “packet delay variance”.
and reliable.
307. In data transfer process, which of the following
303. In which topology, each computer is connected
has multiple bridges between different parts?
to every other computer? A. Firewalls
A. Ring B. Switching packets
B. Bus
C. Hubs
C. Star
D. Software
D. Mesh
Answer: C (Hubs)
Answer: D (Mesh)
308. What is RJ45?
Notes: In the mesh topology each computer is A. A network cable connector
connected to each of the other computers in the B. A node
network. This topology is the most robust and C. An electronic coupler
reliable. It ensures the data privacy and security, D. A video display unit for signaling and
because every message travels along a dedicated controlling multimedia
link.
Answer: A (A network cable connector)
304. Which computer network topology uses routers?
Notes: RJ45 (Registered Jack) is a type of connector
A. Bus
commonly used for Ethernet networking. It looks similar
B. Ring
to a telephone jack, but is slightly wider. Since Ethernet
C. Mesh
cables have an RJ45 connector on each end, Ethernet
D. Tree
cables are sometimes also called RJ45 cables.
Answer: C (Mesh)
47 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

Internet – Standards & Protocols with cybercrime and electronic commerce. The original
Act contained 94 sections, divided into 13 chapters and
309. Cyber law is __. 4 schedules.
A. Law related to electronic media
B. Law related to library offence 313. Which section of the ‘IT Act, 2000’ describes
C. Law related to Internet the ‘Punishment for sending offensive messages
D. Law related to Siberian Libraries through communication service, etc.’?
A. Sec. 44A
Library Info

Library Info
Answer: C (Law related to Internet) B. Sec. 66A
C. Sec. 52 A
310. The term ‘Cyberspace’ was first used by: D. Sec. 43 A
A. Andrew Pollock
B. William Gibson Answer: B (Sec. 66A)
C. John Postalf
D. Joe Flower Notes: A major amendment to IT Act 2000 was made in
2008. It introduced Section 66A which penalized
Answer: B (William Gibson) sending "offensive messages". It also introduced
Section 69, which gave authorities the power of
Notes: William Gibson, an American fiction writer, "interception or monitoring or decryption of any
notably coined the term "cyberspace" in his short story information through any computer resource".
"Burning Chrome" (1982) and later popularized the
concept in his acclaimed debut novel Neuromancer 314. Which section of the ‘IT Act, 2000’ gives the
(1984). authority power to ‘intercept or monitor or
decrypt any information through any computer
311. ‘Internet Governance Guide for Libraries’ is a resource’?
publication of __. A. Sec. 66
A. ALA B. Sec. 54
B. IFLA C. Sec. 69
C. UNESCO D. Sec. 72
D. OCLC
Answer: C (Sec. 69)
Answer: B (IFLA)
Notes: Under Chapter 11 of IT Act 2000, Section 69
312. Which section of the ‘IT Act, 2000’ describes deals with the powers to issue directions for interception
the provision for ‘Compensation for failure to or monitoring or decryption of any information through
protect data’? any computer resource.
A. Sec. 33
B. Sec. 43A 315. Email address is made up of __.
C. Sec. 52A A. Single part
D. Sec. 44 B. Two parts
C. Three parts
Answer: B (Sec. 43A) D. Four parts
Notes: The Information Technology Act, 2000 (also Answer: B (Two parts)
known as ITA-2000, or the IT Act) is an Act of
the Indian Parliament (No 21 of 2000) notified on 17 Notes: An email address is a unique identifier for
October 2000. It is the primary law in India dealing an email account. It is used for both to send and receive

48 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

email messages over the Internet. Every email address 319. W3C was set up in the year ___.
has two main parts: a username and domain name. The A. 1992
username comes first, followed by an at (@) symbol, B. 1994
and then domain name. C. 1998
D. 2000
316. Deleted e-mail can be found in __.
A. Trash folder Answer: B (1994)
B. Inbox folder
Library Info

Library Info
C. Starred folder Notes: W3C (World Wide Web Consortium) setup in
D. Spam folder 1994 is the main international organization for
developing protocols and guidelines that ensures long-
Answer: A (Trash folder) term growth for the World Wide Web.

317. Who among the following was the beginner of 320. The type of connectivity options provided by
Internet? Internet Service Providers are __.
A. NICNET A. Dial-up
B. ALANET B. Leased lines
C. ARPANET C. VSAT
D. LISNET D. All the above

Answer: C (ARPANET) Answer: D (All the above)

Notes: The first workable prototype of the Internet came 321. Which domains are the most reliable?
in the late 1960s with the creation of ARPANET, or the A. .net and .gov
Advanced Research Projects Agency Network. B. .com and .net
Originally funded by the U.S. Department of Defense, C. .gov and .edu
ARPANET used packet switching to allow multiple D. .org and .uk
computers to communicate on a single network.
Answer: C (.gov and .edu)
318. The International body that coordinates the
assignment of unique domain names, protocol 322. What is called the e-mail which is neither
address is ___. expected nor requested by the receiver?
A. IGF A. E-Mail
B. IANA B. False Mail
C. ICANN C. Junk Mail
D. ISP D. Sea Mail

Answer: C (ICANN) Answer: C (Junk Mail)

Notes: Established in 1998, the Internet Corporation 323. Yahoo mail is an email service launched in __.
for Assigned Names and Numbers (ICANN) is a non- A. 1996
profit public-benefit corporation, responsible, at the B. 1997
overall level, for the administration of three sets of C. 1998
unique identifier systems for the internet: domain D. 1999
names, numerical internet protocol (IP) addresses, Answer: B (1997)
and a third type that serves to identify so-called port and
parameter numbers.
49 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

Notes: Yahoo! Mail is an email service launched in Answer: B (Internet Browser)


1997 through the American parent company Yahoo!.
Yahoo Mail provides four different email plans: three for Notes: A web browser is application software for
personal use and another for businesses. accessing the World Wide Web. When a user requests
a web page from a particular website, the web browser
324. Gmail service was launched in the year: retrieves the necessary content from a web server and
A. 2002 then displays the page on the user's device. The first web
B. 2004 browser, called WorldWideWeb, was created in 1990
Library Info

Library Info
C. 2006 by Tim Berners-Lee.
D. 2008
328. Which is not a web browser?
Answer: B (2004) A. Google Chrome
B. Solaris
Notes: Gmail is a free email service developed by Paul C. Apple Safari
Buchheit for Google. Gmail started as a limited beta D. Microsoft Edge
release on April 1, 2004.
Answer: B (Solaris)
325. ProtonMail service was started in __.
A. 2014 Notes: Solaris is a Unix operating system originally
B. 2015 developed by Sun Microsystems in 1993. In 2010, after
C. 2016 Sun Microsystems acquisition by Oracle Corporation, it
D. 2017 was renamed Oracle Solaris.

Answer: A (2014) Microsoft Edge first released in 2015, is a graphical


web browser of Microsoft for Windows 10 replacing
Notes: ProtonMail is an end-to-end encrypted email IE.
service founded in 2014 at the CERN research facility
by Andy Yen, Jason Stockman, and Wei Sun. 329. Select the correct combinations:
a) Internet Explorer – 1995
326. Hushmail service was started in the year: b) Mozilla Firefox – 2002
A. 1996 c) Google Chrome – 2008
B. 1997 d) Safari - 2003
C. 1998 A. c, and d are correct
D. 1999 B. a, and c are correct
C. b and c are correct
Answer: C (1998)
D. a, b, c, and d are correct
Notes: Hushmail started in 1998, is an encrypted
proprietary web-based email service offering PGP- Answer: D
encrypted e-mail. It ensures to provide authenticated, Notes: Internet Explorer (Microsoft Corporation, 1995);
encrypted messages in both directions. Opera (Opera Software, 1995); Mozilla Firefox (Mozilla
327. Application software which allows user to view Corporation, 2002); Safari (Apple, 2003); Google
Chrome (Google, 2008).
the webpage is called ___.
A. Operating System 330. The term ‘cookie’ was first coined by__.
B. Internet Browser A. Ted Nelson
C. Interpreter B. Lou Montulli
D. Website
50 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

C. L. J. Cook 334. When a crawler crawls the website, any page not
D. Tim Berners-Lee having a further link is called __.
A. Backend Page
Answer: B (Lou Montulli) B. Dead End Page
Notes: The term “cookie” was coined by web browser C. Absolute Page
D. Doorway Page
programmer Lou Montulli. He was one among the team
who invented the first browser ‘Lynx’ for the World Answer: B (Dead End Page)
Library Info

Library Info
Wide Web. He was also instrumental for inventing
‘HTTP Cookie’. 335. What is the component of a search engine which
automatically retrieves documents from the web
331. __ programs are automatically loaded and page?
operates as a part of browser. A. Spider
A. Utilities B. Archiver
B. Plug-ins C. Builder
C. Widgets D. Searcher
D. Add-ons
Answer: A (Spider)
Answer: B (Plug-ins)
Notes: Spider - A program that automatically retrieves
Notes: In computing, a plug-in is a software component webpages and follows the links on them to retrieve
that adds a specific feature to an existing computer more webpages. Spiders are used by search engines to
program. In other words, a plugin is a software add-on retrieve publicly accessible webpages for indexing, and
that is installed on a program, enhancing its they can also be used to check for links to webpages that
capabilities. no longer exist.
332. Crawlers are related to ___. 336. Which of the following is not the component of
A. Search Engines a search engine?
B. Directories A. Spider
C. Protocols B. Index
D. Networks C. Search or retrieval mechanism
Answer: A (Search Engines) D. Natural language technique

Notes: A Web crawler sometimes called a spider or Answer: D (Natural Language Technique)
spiderbot that systematically browses the World Wide 337. Which of the following are the components of
Web, typically for the purpose of Web indexing. It is Search Engine?
generally used by Search engine. a) Spider
b) TCP/IP
333. Which of the following searches websites by
keywords? c) Search Mechanism
A. Web logs d) Index
B. Search engines A. a and b are correct
C. Spyware B. a, c and d are correct
D. Portals C. b and d are correct
D. a and c are correct
Answer: B (Search engines)
Answer: B
51 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

Notes: A search engine normally consists of four Notes: Infoseek was a popular internet search engine
components e.g. search interface, crawler (also known founded in 1994 by Steve Kirsch. It was closed in 1999.
as a spider), indexer, and database.
342. Lycos is a ___.
338. The first page of the website is called as: A. Search engine
A. Home Page B. Programming language
B. Title Page C. Database
C. Cover Page D. Database vendor
Library Info

Library Info
D. Half-Title Page
Answer: A (Search engine)
Answer: A (Home Page)
Notes: Lycos, Inc., is a web search engine and web
339. Which of the following are criteria for Web portal established in 1994, at Carnegie Mellon
evaluation? University. It was the first to attain commercial
a) Revision search engine success.
b) Response time
c) Format 343. Which of the following is a visual search
d) Archiving facility engine?
A. a and b are correct A. Google
B. a, c and d are correct B. Google scholar
C. b and d are correct C. Altavista
D. a and c are correct D. Kartoo

Answer: C Answer: D (Kartoo)

340. The search engine developed by Alan Emtage Notes: Kartoo was a metasearch engine based in France
was: which displayed a visual interface and the search results
A. Veronica were presented as a "map". It was operated from 2001 to
B. ALIWEB early 2010.
C. Archie 344. Vadlo is a search engine for ___.
D. Infoseek A. Science and engineering
Answer: C (Archie) B. Life science literature
C. Library science literature
Notes: Archie was the first tool created by Alan D. Social science and humanities
Emtage and L. Peter Deutsch in 1990 at McGill
University for indexing FTP achieve, and is considered Answer: B (Life Science Literature)
the first basic search engine. Notes: Vadlo is an academic, open-access, free search
engine created to locate Life Sciences research
341. Infoseek was a popular __.
information by searching across specific categories such
A. Gateway
as protocols, online tools, seminars/powerpoint &
B. Search Engine
databases. It was created by Life in Research, LLC.
C. Browsing
D. Highway 345. Athenus search engine is related to __
A. Science and engineering
Answer: B (Search Engine)
B. Life science literature
C. Library science literature
52 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

D. Social science and humanities d) Displayed at the bottom of a search

Answer: A (Science and Engineering) A. b, and c are correct


Notes: Athenus – a Science and Engineering Search B. c, b and d are correct
Engine was originally launched in 1999 as 'Engwho: The C. a, c, and d are correct
D. a and b are correct
Engineering Search Engine'. In 2004, Engwho was
acquired by thinknew and re-launched as Athenus.com Answer: A
Library Info

Library Info
346. Yahoo! search engine was developed at __. Notes: Featured Snippets also known as ‘Answer
A. Stanford University boxes’ are short snippets of text that appear at the top of
B. Carnegie Mellon University Google’s search results in order to quickly answer a
C. McGill University searcher’s query. The content that appears inside a
D. Cambridge University Featured Snippet is automatically pulled from web pages
in Google’s index.
Answer: A (Stanford University)

Notes: Yahoo! started at Stanford University by Jerry


Yang and David Filo (both electrical engineering 350. Which of the following search engines have
graduate students) in 1994 that became a web portal and facilities for Boolean search, truncation, proximity
search engine. search, and phrase search?
a) Alta Vista
347. Google Search engine was developed in __.
b) AOL Search
A. 1995
B. 1997 c) Google
C. 1998 d) Hotbot
D. 1999 A. a and b
B. a, and c
Answer: B (1997) C. b and c
D. c and d
Notes: Google search engine was originally developed
as a research project in 1997 by Larry Page, Sergey Answer: A
Brin, and Scott Hassan of Stanford University.
351. Which of the following are true about a web
348. A brief summary of text that appears at the top portal:
of Google’s search results is called __. a) A portal contains personalized aggregated
A. Template information
B. Featured Snippet b) It requires Login details to access
C. Google Summary c) Web portal contents can be changed by
D. Google Intro authorized users
d) Act as the gateway to the specific
Answer: B (Featured Snippet) knowledge domain
A. a and b are correct
349. Which of the following are the characteristics of
B. a, b, c and d are correct
Google’s ‘featured snippets’ in search?
C. b, c and d are correct
a) Full text answer to a query
D. a and c are correct
b) Quick direct answer to a query
c) Extracted from a web page Answer: B
53 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

Notes: A web portal is a web-based solution that c) RSS feeds


contains personalized aggregated content, available for d) Split screens
authorized users. It acts as a gateway to the specific A. a and b are correct
knowledge domain, restricted to authorized users who B. a, b and d are correct
have Login (username password) details. There is a C. b and d are correct
two way communication between users and portal and D. a and c are correct
its content can be changed by authorized users. Web
Answer: C
Library Info

Library Info
portals are sometimes classified as
horizontal and vertical. A horizontal portal is used as a 355. A collaborative Web site where visitors can add,
platform to several companies in the same economic delete, or modify content, including the work of
sector. A vertical portal is a specialized entry point to a previous authors, is a:
specific market or industry subject area, or interest.
A. Blog
Whereas a website is a web-based solution that consists B. Wiki
of web pages containing publicly available content, C. Domain
available for all without restrictions. It is accessible to D. RSS Feed
all via URL and no one can change its content except
admin. Answer: B (Wiki)

352. A customize website (often based on restrictions Notes: A wiki is a knowledge base website on which
of domain articles) that immerses information users collaboratively modify and structure content
from a wide array of sources in a consistent and directly from the web browser. A wiki is run using wiki
unified manner is known as __. software, otherwise known as a wiki engine. The online
A. A collection of interlinked webpages encyclopedia project Wikipedia is the most popular
B. Web portal wiki-based website which is a collection of hundreds of
C. Online portal wikis. Ward Cunningham, the developer of the first
D. Website wiki software, WikiWikiWeb.

Answer: B (Web portal)

353. Which of the following facilitate formal 356. A set of rules which allows different devices to
communication on the web? hold conversations, what is that called in the field
a) Wikis of communication?
b) Chat A. Agreement
c) RSS feeds B. Protocol
d) Split screens C. Treaty
A. a and b are correct D. Memorandum
B. a, b and d are correct
C. c and d are correct Answer: B (Protocol)
D. a and c are correct
Notes: A communication protocol is a set of rules or
Answer: D procedures that allow two or more electronic devices of
a communications system to transmit information.
354. Which of the following facilitate informal
communication on the web? 357. Which type of protocol is used by www to
a) Wikis transmit data?
b) Chat A. TCP

54 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

B. HTTP use port 443 by default, whereas, HTTP URLs begin


C. IP with "http://" and use port 80 by default. HTTP is not
D. UDP encrypted and thus is vulnerable to cyber attacks
whereas HTTPS is encrypted and secure.
Answer: B (HTTP)
Secure Hypertext Transfer Protocol (S-HTTP)
Notes: HTTP is the protocol used to transmit all data developed by Eric Rescorla and Allan M. Schiffman,
present on the World Wide Web. and published in 1999, is an obsolete alternative to
Library Info

Library Info
358. Who among the following was associated with the HTTPS protocol for encrypting web communications
the development of HTTP? carried over HTTP.
A. Ted Nelson 361. The bit number as defined in IP address in
B. Tim Berners Lee Internet Protocol Version 4 is __.
C. Jason Stockman A. 16
D. Michael Casey B. 128
Answer: B (Tim Berners Lee) C. 64
D. 32
Notes: The Hypertext Transfer Protocol (HTTP) is
an application protocol used for data communication for Answer: D (32)
the World Wide Web. It is used to create hyperlinks and Notes: Internet Protocol version 4 (IPv4) is the fourth
develop hypertext documents. It was initially released in version of the Internet Protocol (IP). IPv4 uses a 32-bit
1991. address space. IPv4 was the first version deployed for
359. String of text that are links to other pages are production in the ARPANET in 1983.
called: 362. Which among the following is correct about
A. Hyperlinker IPv4?
B. Multimedia A. IPv4 is a 32-Bit IP Address
C. Hypermedia B. IPv4 is a numeric address, and its binary bits
D. Hyperlinks are separated by a dot (.)
C. Both A and B
Answer: D (Hyperlinks) D. None of the above
360. What does HTTPS stands for __. Answer: C (Both A and B)
A. Hypertext Transfer Protocol Secure
B. Hypertext Transfer Protocol Safe Notes: IPv4 is 32 bit binary number used to identify
C. Hypertext Transfer Protocol Security machines connected to a network.
D. Hypertext Transfer Protocol Safety
363. Which among the following is correct about
Answer: A (Hypertext Transfer Protocol Secure) IPv6?
A. IPv6 is 128 Bit IP Address
Notes: Hypertext Transfer Protocol Secure (HTTPS) B. IPv6 is an alphanumeric address whose
is an extension of the Hypertext Transfer binary bits are separated by a colon (:).
Protocol (HTTP). It is used for secure communication C. Both A and B
over a computer network. In HTTPS, the communication D. None of the above
protocol is encrypted using Transport Layer Security
(TLS). HTTPS URLs begin with "https://" and Answer: C (Both A and B)

55 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

Notes: IPv6 (Internet Protocol version 6) is the most A. Uniform Resource Identity
recent version of the Internet Protocol initiated in 1994. B. Uniform Resource Identifier
With 128-bit binary number address space, it is also C. Unique Resource Identity
called IPng (Internet Protocol next generation). IPv6 D. Unique Resource Identifier
is an alphanumeric address whose binary bits are
separated by a colon (:). It also contains hexadecimal. Answer: B (Uniform Resource Identifier)

364. Select the correct combinations: Notes: Uniform Resource Identifier (URI) is a string of
Library Info

Library Info
a) Class A IP – Support large network with characters used to identify a name or a resource (text
many devices document, image file, etc) on the Internet. A URI
b) Class B IP – Supports medium-sized identifies a resource either by location, or a name. It has
networks two specializations or subset known as URL and URN.
c) Class C IP – Supports small networks with
fewer than 256 devices 367. Which of the following is an example of URN ?
d) Class D IP – Reserved for multicast groups A. URI
B. URL
A. a and d are correct
B. b and c are correct C. DOI
C. a and b are correct D. ISBN
D. All are correct
Answer: D (ISBN)
Answer: D
Notes: A classful network is a network Notes: A Uniform Resource Name (URN) is a subset of
addressing architecture used in the Internet from 1981 URI that identifies a resource by name in a particular
until the introduction of Classless Inter-Domain namespace. However, it does not imply location or
Routing in 1993. The method divides the IP availability of the identified resource. For example, in
address space for Internet Protocol version 4 (IPv4) the International Standard Book Number (ISBN)
into five address classes based on the leading four system, ISBN 0-486-27557-4 identifies a specific edition
address bits. Classes A, B, and C provide addresses for of Shakespeare's play Julius Caesar. The URN for that
networks of three different network sizes (Large, edition would be urn:isbn:0-486-27557-4. However, it
Medium and Small respectively as defined above). Class gives no information as to where to find a copy of that
D is reserved for multicast networking and the class E book.
IP address is reserved for future or experimental
purposes. 368. In the World Wide Web, name the acronym that
describes the internet address of a file__.
A. ULA
365. In the context of IP address, which of the B. RELUR
following is correct? C. URI
A. IP number is assigned to the PC D. URL
B. IP number is assigned to the organization
C. IP number is assigned to the network Answer: D (URL)
interface card
Notes: A URL (Uniform Resource Locator), also a
D. None of the above
subset of URI, is a unique identifier used to locate and
Answer: C (IP number is assigned to the network retrieve a resource on the internet. It is also referred to
interface card) as a web address. URLs consist of multiple parts --
including a protocol and domain name -- that tell a web
366. URI stands for __. browser how and where to retrieve a resource. Uniform
56 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

Resource Locator (URL) was invented by Tim Notes: URLs cannot contain spaces. URL encoding
Berners Lee. normally replaces a space with a plus (+) sign or with %.

369. The Internet Addresses are also known as __. 373. In the URL,
A. URL http://www.lismcqspractice.com, which of the
B. OCR following is called as protocol?
C. MICR A. http
D. UDP B. www
Library Info

Library Info
C. lismcqspractice
Answer: A (URL) D. .com
Notes: A URL (Uniform Resource Locator) is a unique Answer: A (http)
identifier used to locate and retrieve a resource on the
internet. It is also referred to as a web address. 374. The web address that acts as permanent
identifier is ___.
370. What tells the browser software exactly where to A. URL
look for the information being requested? B. DOI
A. HTML C. PURL
B. URL D. UDI
C. HTTP
D. Domain Name Answer: C (PURL)

Answer: B (URL) Notes: PURL (Persistent Uniform Resource Locator)


is a location-based Uniform Resource Locator that is
371. URL is a term associated with __. used to redirect to the location of the requested web
A. Computer hardware resource. In other words, it redirects requests to the
B. Internet proper location of a user’s requested web resource. It is
C. Laser Printer meant to remain constant despite an ever changing Web
D. Fax infrastructure. The PURL concept was developed at
Answer: B (Internet) OCLC in 1995.

375. Digital Object Identifier (DOI) is an __.


Notes: Uniform Resource Locator (URL), also termed
as ‘Web address’ is a reference to a web resource that A. Internet based global network and resolution
specifies its location on the internet. A URL is a specific system
B. Internet based global naming and resolution
type of Uniform Resource Identifier (URI), first invented
system
in 1994 by Tim Berners Lee.
C. Internet based global network and repository
372. Percentage (%) sign is used in an URL to system
represent: D. Internet based global naming and repository
A. Space system
B. Date
C. Time Answer: B (Internet based global naming and
D. Person resolution system)

Answer: A (Space) 376. DOI always starts with the digits ___.
A. 40
B. 30
57 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

C. 20 virtual terminal connection. In other words, TELNET is


D. 10 used for remote login for a system.

Answer: D (10) 379. UDP is an internet protocol stands for __.


A. User Datagram Protocol
Notes: In computing, a digital object identifier (DOI) is B. User Defined Protocol
a persistent identifier or handle used to identify objects C. Universal Data Protocol
uniquely. DOIs are in wide use mainly to identify D. Utility Data Protocol
Library Info

Library Info
academic, professional, and government information,
such as journal articles, research reports and data sets, Answer: A (User Datagram Protocol)
and official publications. The developer and
administrator of the DOI system is the International Notes: In computer networking, the User Datagram
DOI Foundation (IDF), which introduced it in 2000. A Protocol (UDP) is one of the core members of
DOI takes the form of a character string divided into two the Internet protocol suite. The protocol was designed
parts, a prefix and a suffix, separated by a slash. The by David P. Reed in 1980 and works under Transport
prefix identifies the registrant of the identifier, and the layer protocol of OSI model.
suffix is chosen by the registrant and identifies the 380. Which of the following is NOT an internet
specific object associated with that DOI. protocol?
377. Gopher is a __. A. NMP
A. Tool to access computer B. HTTP
B. Tool to access catalogue C. FTP
C. Tool to access internet D. SMTP
D. Tool to analyse Network
Answer: C (NMP)
Answer: C (Tool to access Internet) 381. POP stands for ___.
Notes: The Gopher protocol is a communications A. Print Office Protocol
protocol designed for distributing, searching, and B. Post Office Protocol
retrieving documents in Internet Protocol networks. It C. Pre Office Protocol
was invented by a team led by Mark P. McCahill at D. Post Object Protocol
the University of Minnesota. Answer: B (Post Office Protocol)
378. The purpose of the ____ protocol is to provide a Notes: In computing, the Post Office Protocol (POP) is
bi-directional communication facility. an application-layer Internet standard protocol used by e-
A. FTP mail clients to retrieve e-mail from a mail server. POP
B. TELNET version 3 (POP3), 1988 is the version in common use.
C. SMTP
D. Z39.50 382. PGP Stands for ___.
A. Pretty Good Privacy
Answer: B (Telnet) B. Post Good Protocol
Notes: Telnet (TELecommunication NETwork), C. Pretty Grand Privacy
D. Pre Good Protocol
initially developed in 1969, is an application layer
protocol used on the Internet or local area network to Answer: A (Pretty Good Privacy)
provide a bidirectional interactive text-oriented
communication facility using a
58 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

Notes: Pretty Good Privacy (PGP) initially released in D. Boot P


1991, is an encryption program that provides
cryptographic privacy and authentication for data Answer: C (ICMP)
communication. PGP is used for signing, encrypting, and Notes: ICMP (Internet Control Message Protocol) is
decrypting texts, e-mails, files, directories, and whole an internet layer protocol used by network devices to
disk partitions and to increase the security of e-mail diagnose network communication issues. ICMP is
communications. mainly used to determine whether or not data is reaching
Library Info

Library Info
383. The protocol used to provide security to emails its intended destination in a timely manner. Commonly,
is known as __. the ICMP protocol is used on network devices, such as
A. POP routers to generate error messages to the source IP
B. PGP address when network problems prevent delivery of IP
C. SNMP packets.
D. TCP 387. ICMP is primarily used for __.
Answer: B (PGP) A. Error and diagnostic functions
B. Addressing
384. SNMP stands for ___. C. Forwarding
A. Simple Network Management Protocol D. None of the above
B. Single Network Management Protocol
C. Systematic Network Management Protocol Answer: A (Error and diagnostic functions)
D. Solid Network Management Protocol 388. Which one of the following protocol is used in
Answer: A (Simple Network Management Protocol) file transfer over internet?
A. FTP
Notes: Simple Network Management Protocol B. SMTP
(SNMP) is an Internet Standard protocol for collecting C. POP
and organizing information about managed devices D. TCP/IP
on IP networks and for modifying that information to
change device behavior. Devices that typically support Answer: A (FTP)
SNMP include cable modems, routers, switches, servers, Notes: The File Transfer Protocol (FTP) is a
workstations, printers, and more. SNMP is widely used standard network protocol used for the transfer
in network management for network monitoring. of computer files between a client and server on
385. The communication protocol used by Internet is a computer network. The original specification for the
__. File Transfer Protocol was written by Abhay
A. HTTP Bhushan and published in 1971. FileZilla is an open
B. WWW source FTP solution.
C. TCP/IP 389. FTP is used for __.
D. FTP A. Uploading files only
Answer: C (TCP/IP) B. Downloading files only
C. Both A and B
386. Which protocol does Ping use? D. None of the above
A. TCP
B. ARP Answer: C (Both A and B)
C. ICMP
59 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

Notes: FTP (File Transfer Protocol), is a protocol used protocol used by email clients to retrieve email messages
to upload files from a workstation to a FTP server or from a mail server over a TCP/IP connection.
download files from a FTP server to a workstation. Multipurpose Internet Mail Extensions (MIME) is an
Whereas HTTP (Hyper Text Transfer Protocol) is a Internet standard that extends the format of email
protocol used to transfer files from a Web server onto a messages to support text in character sets other than
browser in order to view a Web page that is on ASCII, as well as helps in sending attachments of audio,
the Internet. video, images, and application programs.
Library Info

Library Info
390. SMTP stands for ___. 392. Usenet is __.
A. Simple Mail Transfer Protocol A. A provider of news
B. Single Mail Transfer Protocol B. A low-cost dial-up netowork
C. Sample Mail Transfer Protocol C. Used to forward jobs and files through
D. None of the above several hosts
D. None of the above
Answer: A (Simple Mail Transfer Protocol)
Answer: A (A provider of news)
Notes: Simple Mail Transfer Protocol (SMTP) is
a communication protocol for electronic mail (e-mail) Notes: Usenet is a worldwide distributed discussion
transmission. Mail servers and other message transfer system available on computers. In other words, it is a
agents use SMTP to send and receive mail messages. As network where people exchange news. Users read and
an Internet standard, SMTP was first defined in post messages (collectively termed news) to one or more
1982 and updated in 2008. categories, known as newsgroup. Its main purpose is to
offer a network where users can post information freely,
391. Which of the following is an email protocol? which is then distributed. This allows others to access
a) SMTP the information easily and as quickly as possible. Usenet
b) POP3 was conceived in 1979 and created in 1980 by two
c) IMAP-4 graduate students of Duke University in North Carolina,
d) MIME Jim Ellis and Tom Truscott worked on their idea of
A. a and b are correct connecting different computers to exchange information
B. a, and c are correct within the UNIX community, and thus created a network
C. b and d are correct that allowed the exchange of information and served as a
D. a, b, c, and d are correct bulletin-board.
Answer: D 393. Which is not applicable to extensible Markup
Notes: Simple Mail Transfer Protocol (SMTP) is Languages?
A. It is compatible with SGML
a communication protocol for electronic mail (e-mail)
B. It is usable over internet
transmission. Mail servers and other message transfer
agents use SMTP to send and receive mail messages C. XML documents are easy to create
efficiently and reliably over internet. Post Office D. It has to do with semantics to data
Protocol version 3 (POP3) is an application layer Answer: D (It has to do with semantics to data)
protocol used by e-mail clients to retrieve e-mail from a
mail server. POP3 is generally used to support single 394. Arrange the following in the order of
client by storing email on the server until we check development:
email by opening remote email boxes. Internet Message a) GML
Access Protocol (IMAP) is an Internet standard b) Hypermedia

60 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

c) SGML C. IBM
d) Memex D. World Wide Web Consortium (W3C)
A. d, b, a, c
B. b, d, c, a Answer: C (IBM)
C. c, b, d, a Notes: GML was developed by IBM in 1969.
D. a, b, c, d
398. HTML (Hypertext Markup Language) was
Answer: A
Library Info

Library Info
developed by:
Notes: Memex (1945); Hypermedia (1965); GML A. Apple
(1969); SGML (1986) B. Microsoft
C. IBM
395. The term ‘Memex’ was first coined by: D. World Wide Web Consortium (W3C)
A. Ted Nelson
B. Vannevar Bush Answer: D (World Wide Web Consortium (W3C)
C. Michael Buckland Notes: Hypertext Markup Language (HTML) is the
D. J.C.R. Licklider standard markup language for creating web pages
Answer: B (Vannevar Bush) and web applications. It is extended version of SGML
and first released in the year 1993.
Notes: The memex is the name of the
hypothetical proto-hypertext system that Vannevar 399. Which of the following is a file format for E-
Bush described in his 1945 article "As We May documents?
Think". Bush envisioned the memex as an A. HTTP
electromechanical device in which individuals would B. TCP/IP
compress and store all of their books, records, and C. FTP
communications, "mechanized so that it may be D. HTML
consulted with exceeding speed and flexibility". Answer: D (HTML)
396. SGML Stands for ___. Notes: Hyper Text Markup Language, first released in
A. Standard Generalized Markup Language 1993, is the standard markup language for documents
B. Simple Generalized Markup Language designed to be displayed in a web browser.
C. Single General Markup Language
D. Standard Group Markup Language 400. HTML is derived from __.
A. URL
Answer: A (Standard Generalized Markup B. SGML
Language) C. TCP/IP
Notes: The Standard Generalized Markup D. Browsers
Language (SGML; ISO 8879:1986) is a standard for Answer: B (SGML)
defining generalized markup languages for documents
processing. It is an extended version of GML. Notes: HTML is the extended version of Standard
Generalized Markup Language (SGML).
397. GML (Generalized Markup Language) was
developed by __. 401. Documents converted to ___ can be published
A. Apple on the web.
B. Microsoft A. .doc file

61 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

B. http b) Linux Kernel


C. Machine language c) OpenOffice
D. HTML d) Perl
A. (a), (d), (c) and (b)
Answer: D (HTML) B. (c), (b), (d), and (a)
C. (c), (d), (b) and (a)
402. The extension with which web documents are
D. (d), (b), (c) and (a)
saved as __.
Library Info

Library Info
A. .html Answer: D
B. .css
C. .unix Notes: Perl (1987); Linux Kernel (1991); OpenOffice
D. .csl (2001); Firefox (2002)

Answer: A (.html) 406. Select the correct combinations:


a) Search engine – Crawler
403. Select the correct combinations: b) URL – Webpage
a) HTTP – Tim Berners Lee c) Firewall – Protecting unauthorized access to
b) FTP – Abhay Bhusan Internet
c) S-HTTP - Eric Rescorla and Allan M. d) HTTP - Internet Standard for Information
Schiffman Transmission
d) SMTP – Robert E. Kahn and Vintcerf A. a and d are correct
A. a and d are correct B. b and c are correct
B. a, b and c are correct C. a and b are correct
C. b and c are correct D. All are correct
D. All are correct Answer: D
Answer: D
404. Which of the statement (s) is /are false? Multimedia Technology Fundamentals
a) XML overcomes the limitations in HTML to
support a structured way of organizing 407. Who enunciated the term hypertext?
content A. E. Garfield
b) XML specification is not case sensitive B. Raj Reddy
while HTML specification is case sensitive C. Ted Nelson
c) XML supports user defined tags while D. Bill Gates
HTML uses pre-defined tags
Answer: C (Ted Nelson)
d) XML tags need not be closed while HTML
tags must be closed Notes: Ted Nelson, an American Information
A. b only Technology Scientist is credited with coining several
B. a only new words. ‘Hypertext and ‘Hypermedia’ coined in
C. b and d only 1963 and first published in 1965. He also coined the
D. c and d only terms: Transclusion, Virtuality, Interwingularity and
didonics.
Answer: C
408. Which of the following is a component of
405. Arrange the following open source software in
hypertext?
chronological order of their development:
A. Audio
a) Firefox
62 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

B. Text Answer: B (MPEG)


C. Video
D. Audio-video Notes: The Moving Picture Experts Group (MPEG) is a
working group of authorities, formed in 1988 by ISO
Answer: B (Text) and IEC to set standards for audio and video
compression & transmission. It was established with the
409. Which of the following is used for image initiative of Hiroshi Yasuda and Leonardo
editing? Chiariglione.
Library Info

Library Info
A. OmniPage
B. Abbey Finereader 412. JPEG- a file format for compressing image files
C. Gimp stands for __.
D. PDF Reader A. Joint Picture Experts Group
B. Joint Photographic Experts Group
Answer: C (Gimp) C. Joint Photo Experts Group
D. None of the above
Notes: GIMP (GNU Image Manipulation Program) is
a free and open-source image editor that can be used in Answer: B (Joint Photographic Experts Group)
all major operating systems (Linux, Mac, and Windows).
It has a customizable interface so that you can easily set Notes: JPEG (Joint Photographic Experts Group) is a
the view and behavior of GIMP. file format for compressing image files, became standard
in 1992.
OmniPage is Optical Character Recognition (OCR)
software available from Kofax Incorporated. OmniPage 413. GIF (Graphics Interchange Format) employs:
was one of the first OCR programs to run on personal A. Flexible compression
computers. B. No compression
C. Loss compression
ABBYY FineReader PDF is an optical character D. Lossless compression
recognition (OCR) application developed by ABBYY,
with support for PDF file editing. Answer: D (Lossless compression)

410. Which of the following is an open source Notes: GIF is an image file format commonly used for
graphic designing software? images on the web. Unlike the JPEG image format,
A. Pen GIFs uses lossless compression that does not degrade
B. Vista the quality of the image.
C. Adobe
D. Inkscape 414. Which format is used for animation?
A. GIF
Answer: D (Inkscape) B. JPEG
C. PNG
Notes: Inkscape, first released in 2003 is a free and D. TIFF
open-source vector graphics editor used to create vector
images. Answer: A (GIF)

411. Which one of the following is not image format? Notes: A GIF (Graphics Interchange Format) is a
A. TIFF lossless format for image files that supports both
B. MPEG animated and static images.
C. JPEG
D. GIF
63 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

415. Which of the following are proprietary file 1995. Audio Interchange File Format (.aiff) is an audio
formats? file format standard used for storing sound data for
a) MrSID personal computers and other electronic audio devices.
b) GIF The format was developed by Apple Inc. in 1988.
c) RAR
d) TIFF 418. TIFF stands for __.
A. a, and d are correct A. Tagged Image File Format
B. Tiled Image File Format
Library Info

Library Info
B. c and d are correct
C. a and c are correct C. Total Image File Format
D. b and d are correct D. Tabular Image File Format

Answer: C Answer: A (Tagged Image File Format)

Notes: RAR (short for Roshan Archive) is a Notes: TIFF (Tagged Image File Format) is an image
proprietary archive file format developed by Russian file format mostly used for containing high quality
software engineer Eugene Roshal that supports data graphics. TIF format was a creation of Aldus
compression, error recovery and file spanning. Corporation and later acquired by Adobe.
Multiresolution Seamless Image Database (MrSID) is 419. Rich Text Format (RTF) is concerned with:
a closed, proprietary format for storing images originally a) Formatting features like Font type, size, etc.
developed at the US Government's Los Alamos National
b) Transporting text documents across different
Laboratory. computers
416. Which of the following audio formats results in c) Multimedia formatting
smaller file size? d) Formatting based on binary concept
A. WAV A. a and b are correct
B. MP3 B. a, c and d are correct
C. MIDI C. b and d are correct
D. None of the above D. a and c are correct

Answer: B (MP3) Answer: A

417. Identify the Audio File Format for Digital 420. The general image file formats are:
libraries: a) TIFF
a) .tif b) JPEG
b) .jfif c) MPEG
c) .aiff d) PNG
d) .ra A. a and b are correct
B. a, b and d are correct
A. a, and b are correct C. b and d are correct
B. b, and c are correct D. a and c are correct
C. c and d are correct Answer: B
D. a, and d are correct
Notes: The Moving Picture Experts Group (MPEG)
Answer: C is a working group of authorities that was formed by ISO
Notes: RealAudio (.ra) is a proprietary audio format and IEC to set standards for audio and video
developed by RealNetworks and first released in April compression and transmission. It was established in
64 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

1988 by the initiative of Hiroshi Yasuda and Leonardo A. Bit handling


Chiariglione. B. Bit mapping
C. Bit pattern
421. Which of the following provides lossy D. Bit matrix
compression of images?
A. GIF Answer: B (Bit mapping)
B. JPEG
C. PNG 425. Identify the correct sound file formats:
Library Info

Library Info
D. MNG a) .MOV
b) .WAV
Answer: B (JPEG) c) .MID
d) .MPG
Notes: Joint Photographic Experts Group (JPEG),
initially released in 1992, is a commonly used method A. a, and b are correct
of lossy compression for digital images, particularly for B. b, and c are correct
those images produced by digital photography The C. c and d are correct
degree of compression can be adjusted, allowing a D. a, and d are correct
selectable tradeoff between storage size and image
quality. Answer: B

422. Which of the following provides lossless 426. Which of the following are not general image
compression of images? file format?
A. GIF a) DOC
B. JPEG b) MPEG
C. PNG c) MP4
D. MNG d) PNG

Answer: C (PNG) A. a, and b are correct


Notes: Portable Network Graphics (PNG) initially B. b, and c are correct
released in 1996, is a raster-graphics file-format that C. c and d are correct
supports lossless data compression. PNG was developed D. a, and c are correct
as an improved, non-patented replacement for Graphics Answer: D
Interchange Format (GIF).
427. PDF files are in __.
423. Which of the following file format is NOT a A. Web Format
video file format? B. Film Format
A. .AW C. Image Format
B. .MOV D. Text Format
C. .MP4
D. .JPEG Answer: D (Text Format)

Answer: C (.JPEG) Notes: The Portable Document Format (PDF) is a file


format developed by Adobe in the 1993 to present
424. A technique displaying graphic information on documents, including text formatting and images. PDF
screen, pixel by pixel with bits held in main was standardized as an open format, ISO 32000, in
memory is:

65 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

2008, and no longer requires any royalties for its technology is used for collecting data from “fill-in-the-
implementation. bubble” forms such as educational tests, surveys,
assessments, evaluations, and many other multiple
428. OCR stands for __. choice forms.
A. Optical Chart Recognition
B. Optical Character Recognition 432. From the following, identify the mobile
C. Operating Character Reader applications for image recognition developed by
D. Operating Character Recognition Google:
Library Info

Library Info
a) Google Goggles
Answer: B (Optical Character Recognition) b) Google Specs
c) Google Glass
429. OmniPage is a ___.
A. Image software d) Google Lens
B. Remote login software A. a and b are correct
C. DBMS software B. a, and d are correct
C. b and d are correct
D. OCR software
D. a and c are correct
Answer: D (OCR Software)
Answer: B
Notes: OmniPage is an Optical Character Recognition
(OCR) application available from Kofac Inc which Notes: Google Goggles was an image recognition
acquired its rights in 2019 from Nuance mobile app developed by Google in 2009. It was
Communications. It was one of the first OCR programs used for searches based on pictures taken by
to run on personal computers. handheld devices.
Google Lens is an image recognition technology
430. Data Recognition technology, OCR is used for
developed by Google in 2017, designed to bring up
__.
relevant information related to objects it identifies
A. Reading mark present in a pre-defined
position using visual analysis based on a neural network.
B. Identifying signs and characters and creates
an editable word document of the scanned 433. Which of the following is not file hosting
document. service?
C. Selecting character in a word document and A. One Drive
converting into signs and symbols B. Google Drive
D. None of the above C. Live Drive
D. Xbox Live
Answer: B
Answer: D (Xbox Live)
431. OMR stands for __.
A. Optical Machine Recognition 434. ‘One Drive’ is operated by ___.
B. Optical Mark Recognition A. Alphabet
C. Online Machine Recognition B. Microsoft
D. Online Mark Recognition C. Google
D. Whatsapp
Answer: B (Optical Mark Recognition)
Answer: B (Microsoft)
Notes: OMR stands for Optical Mark Recognition or
Optical Mark Reading. This popular recognition
66 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

Notes: OneDrive, first released in August 2007, is a file synchronization, personal cloud, and client software. It
hosting service and synchronization service operated by was first released in September 2008.
Microsoft as part of its suite of Office Online services.
438. OneDrive is a file hosting service of __.
435. Identify online storage and searching devices A. Google
from the following: B. Microsoft
a) Sugarsync C. Apple
b) Opendrive D. None of the above
Library Info

Library Info
c) Dropbox
d) Wipersync Answer: B (Microsoft)
A. a and b are correct
Notes: OneDrive (formerly known as SkyDrive,
B. a, c and d are correct Windows Live SkyDrive) is a file hosting and
C. b, c and d are correct synchronization service operated by Microsoft and first
D. a, b, and c are correct released in August 2007.
Answer: D
Data & Network Security
436. Sugarsync, a cloud based online storage and
searching device was first released in __. 439. Which one of the following statement is NOT
A. November 2009 correct for digital signature?
B. November 2010 A. It is a mechanism for authentication
C. August 2009 B. It cannot be duplicated
D. August 2010 C. It is created by encrypting information
D. It is the scanned image of one’s signature
Answer: A (November 2009)
Answer: D (It is the scanned image of one’s signature)
Notes: SugarSync is a cloud service that enables active
synchronization of files across computers and other Notes: A digital signature is an authentication
devices for file backup, access, syncing, and sharing mechanism that enables the creator of the message to
from a variety of operating systems, such as Android, attach a code that acts as a signature.
iOS, Mac OS X, and Windows devices. It was initially 440. Virus is software which can __.
released in November 2009 by California (US) based J2 A. Manipulate data
Global Company. B. Replicate itself
437. Dropbox, a file hosting service was first released C. Damage computer
in ___. D. All the above
A. 2006 Answer: D (All the above)
B. 2007
C. 2008 441. ‘A piece of program code, that spreads by
D. 2009 making copies of itself’ is an ___.
A. Virus
Answer: C (2008) B. File Format
Notes: Dropbox is a file hosting service operated by the C. Email
American company Dropbox, Inc., headquartered in D. Bandwidth
San Francisco, California, that offers cloud storage, file Answer: A (Virus)

67 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

442. Internet filtering is __. resource such as accessing a website, network, emails,
A. A form of censorship etc or making it extremely slow. This type of attack is
B. Acceptable user policy usually implemented by hitting the target resource such
C. Access to inappropriate material as a web server with too many requests at the same time.
D. Blocking internet facility This results in the server failing to respond to all the
requests. The effect of this can either be crashing the
Answer: A (A form of censorship) servers or slowing them down.
Library Info

Library Info
Notes: Internet filtering is a more gentle way of saying DDoS (Distributed Denial of Service) Attack is an
“censorship”. Internet censorship is the control or attack in which the attack comes from multiple sources
suppression of what can be accessed, published, or having different IP addresses. Basically a DDoS attack is
viewed on the Internet. a DoS attack in which the attack is perpetrated using
443. When a cracker attempts to misuse or steal data several source IP addresses.
from system is called: 446. Which among the below statement is correct
A. Intrusion regarding Botnet?
B. Instruction A. a collection of internet-connected devices
C. Interpolation infected by malware
D. Innovation B. The word ‘botnet’ is a combination of ‘robot’
and ‘network’
Answer: A (Intrusion)
C. Cyber criminals use botnets to instigate
444. Junk email is also called __. malicious activities such as credentials leaks,
A. Spoof unauthorized access, data theft and DDoS
B. Spam attacks
C. Faulty D. All are correct
D. Cookie
Answer: D
Answer: B (Spam)
Notes: A botnet is a collection of Internet-connected
Notes: Junk email is unsolicited messages sent in bulk devices such as computers, smartphones or IoT devices
by email. whose security have been breached and controlled by a
third party. Each compromised device, known as a "bot",
445. An attempt to make a computer resource is created when a device is penetrated by a malicious
unavailable to its intended user is called __. software. The controller of a botnet is able to direct the
A. Denial of Service (DoS) Attack activities of these compromised computers through
B. Virus Attack communication channels. Cyber criminals use botnets to
C. Worm Attack instigate botnet attacks, which include malicious
D. Bot-net Attack activities such as credentials leaks, unauthorized access,
data theft and DDoS attacks.
Answer: A (Denial of Service (DoS) Attack)
447. Which of the following is NOT an intrusion
Notes: A DoS (Denial of Service) Attack is an attack
detection system for windows?
which is perpetrated for the purpose of making a target
A. Suricata
machine or network resource unavailable for its intended
B. Zeek
users. The attack is usually made to temporarily or
C. Snort
indefinitely suspend a service of a host connected to
D. Stealthwatch
internet and thereby deny legitimate users access to a
68 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

Answer: D (Stealthwatch) D. None of the above

Notes: An intrusion detection system (IDS) or Anomaly Answer: A


Detection System is a device or software application
that monitors a network for malicious activity or Notes: In terms of the accuracy of an IDS, there are four
policy violations. Any malicious activity or violation is possible states for each activity observed. A True
typically reported or collected centrally using a security Positive state is when the IDS identifies an activity as
information and event management system. Examples of an attack and the activity is actually an attack. A true
Library Info

Library Info
some of the free and open source IDS are: Kismet, positive is a successful identification of an attack. A
Zeek, Snort, Suricata, and Sagan. True Negative state is when the IDS identifies an
activity as acceptable behavior and the activity is
448. What are the different ways to classify an IDS? actually acceptable. A true negative is successfully
A. Zone based ignoring acceptable behavior. Neither of these states are
B. Host & Network based harmful as the IDS is performing as expected. A False
C. Network & Zone based Positive state is when the IDS identifies an activity as
D. Level Based an attack but the activity is acceptable behavior. A
false positive is a false alarm. A False Negative state is
Answer: B (Host & Network Based) when the IDS identifies an activity as acceptable
when the activity is actually an attack. A false
Notes: There are two general types of Intrusion
negative is when the IDS fails to catch an attack. This is
Detection Systems. IDS that operate on a host to detect
malicious activity on that host are called as Host Based the most dangerous state since the security professional
Intrusion Detection Systems (HIDS). IDS systems that has no idea that an attack took place.
operate on network data flow are called Network Based
Intrusion Detection Systems (NIDS).

449. In terms of the accuracy of an Intrusion


Detection System (IDS), a false positive alert can
be defined as __.
A. An alert that indicates nefarious activity on a
system but in actual that activity turns out
legitimate and acceptable behavior
B. An alert that indicates an activity as
acceptable when the activity is actually an
attack.
C. The lack of an alert for nefarious activity

69 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII
Library Info

Library Info
Assertion
&
Reasoning

70 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

1. Assertion (A): Results from popular web search Reason (R) : The graphical display at the
engines are usually having high recall, but an beginning of the program prolongs the life of
indexing database can provide high precision. monitor.
Reason (R): Indexing databases use controlled A. (A) is true, but (R) is false
vocabulary which is a carefully selected list of B. (A) is false, but (R) is true
words and phrases which are used to tag units of C. Both (A) and (R) are true
information (document or work) so that they D. Both (A) and (R) are false
Library Info

Library Info
may be more easily retrieved.
Answer: A
A. (A) is true, but (R) is false 5. Assertion (A) : Internet can replace libraries.
B. (A) is false, but (R) is true Reason (R) : Google searches will satisfy the
C. Both (A) and (R) are true
maximum users needs.
D. Both (A) and (R) are false

Answer: C A. (A) is true, but (R) is false


B. (A) is false, but (R) is true
2. Assertion (A): SGML is a system for defining C. Both (A) and (R) are true
markup languages. D. Both (A) and (R) are false
Reason (R): HTML uses the SGML constructs.
Answer: D
A. (A) is true, but (R) is false 6. Assertion (A) : A combination of hypertext and
B. (A) is false, but (R) is true Hypermedia contains text, images, sounds and
C. Both (A) and (R) are true
other information.
D. Both (A) and (R) are false
Reason (R): Hypermedia information is
Answer: C represented in a linear fashion.

3. Assertion (A) : With the introduction of A. (A) is true, but (R) is false
Internet, need for reference librarians has been B. (A) is false, but (R) is true
minimized to fulfill the users reference needs. C. Both (A) and (R) are true
Reason (R) : FAQ facility on internet is D. Both (A) and (R) are false
substituting the need for human interface in
libraries. Answer: A

7. Assertion (A) : Open Systems Interconnection


A. (A) is true, but (R) is false allows connectivity of ICT components.
B. (A) is false, but (R) is true Reason (R) : Network Printer goes slow if it is
C. Both (A) and (R) are partially true OSI compatible.
D. Both (A) and (R) are false

Answer: C A. (A) is true, but (R) is false


B. (A) is false, but (R) is true
4. Assertion (A): BIOS is a set of programs that C. Both (A) and (R) are true
handles startup operations in a computer such as D. Both (A) and (R) are false
power on, self tested and low level control for
hardware. Answer: A

71 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

8. Assertion (A): RSS (Rich Site Summary) is C. Both (A) and (R) are true and (R) is the
considered as an alternate to the SDI Service. correct explanation
Reason (R): RSS Feeds enable us to syndicate D. Both (A) and (R) are true but (R) is not
data automatically. the correct explanation

A. (A) is true, but (R) is false Answer: D


B. (A) is false, but (R) is true 12. Assertion (A): Measuring the Internet and in
Library Info

Library Info
C. Both (A) and (R) are true particular the web is a difficult task.
D. Both (A) and (R) are false Reason (R): Web is considered as a new
Answer: C publishing medium with inadequate editorial
process.
9. Assertion (A) : Internet access provides
information in abundance. A. (A) is true, but (R) is false
Reason (R) : Information available on internet B. (A) is false, but (R) is true
always lacks authenticity. C. Both (A) and (R) are true and (R) is the
correct explanation
A. (A) is true, but (R) is false D. Both (A) and (R) are true but (R) is not
B. (A) is false, but (R) is true the correct explanation
C. Both (A) and (R) are true
D. Both (A) and (R) are false Answer: C

Answer: A 13. Assertion (A): Indian libraries are making


optimum use of social networking.
10. Assertion (A) : Libraries are facing a threat and Reason (R): Social networking has wider role in
dissemination of information
are bound to disappear soon.
Reason (R) : Internet and WWW provide access A. (A) is true, but (R) is false
to Oceans of information Worldwide. B. (A) is false, but (R) is true
C. Both (A) and (R) are true
A. (A) is true, but (R) is false D. Both (A) and (R) are false
B. (A) is false, but (R) is true
C. Both (A) and (R) are true Answer: B
D. Both (A) and (R) are false
14. Assertion (A) : Librarians usually prefer to
Answer: B provide access to e-content for the users via a
proxy server, allowing authorized library users
11. Assertion (A): XML, just like HTML is a meta to access content from outside the physical
language that is capable of containing confines of a library.
extendable elements. Reason (R) : Proxy-server access is possible
without IP-address recognition.
Reason (R): XML develop and deploy new
specific mark up, enabling automatic authoring
A. (A) is true, but (R) is false
and processing of networked information.
B. (A) is false, but (R) is true
C. Both (A) and (R) are true
A. (A) is true, but (R) is false
D. Both (A) and (R) are false
B. (A) is false, but (R) is true
Answer: A

72 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

15. Assertion (A): ‘Web Assembly’, a standard that 18. Assertion (A): There are no problems in a
enables applications to run securely in browsers retrieval system in which indexers use natural
(without the use of Plug-ins) is a people-friendly language terms to describe subject matter.
application in using Web. Reason (R): The complete text of a document
Reason (R): A web language transforms the may be stored in a machine readable form.
way people use their devices and the web
making applications are more accessible to A. (A) is true, but (R) is false
Library Info

Library Info
people at ease all over the globe. B. (A) is false, but (R) is true
C. Both (A) and (R) are true
A. (A) is true, but (R) is false D. Both (A) and (R) are false
B. (A) is false, but (R) is true
C. Both (A) and (R) are true Answer: B
D. Both (A) and (R) are false 19. Assertion (A): Library Standards are essential
Answer: C for interaction and collaboration among
libraries.
16. Assertion (A): Web 2.0 is a good set of Reason (R): Z39.50 Protocol virtually has
economic, social and technological trend that reduced the efforts of both classifier and the
collectively form the basis of the next generation cataloguer and hereby made the use of standards
of the Internet. vulnerable.
Reason (R): More than just the latest
technology buzzword, Web 2.0 is a A. (A) is true, but (R) is false
transformative force that is propelling libraries B. (A) is false, but (R) is true
towards a new way to offer services. C. Both (A) and (R) are true
D. Both (A) and (R) are false
A. (A) is true, but (R) is false
B. (A) is false, but (R) is true Answer: C
C. Both (A) and (R) are true 20. Assertion (A): In Indian scenario, a larger
D. Both (A) and (R) are false chunk of Librarians can hardly handle IT related
Answer: C matters, either due to lack of proper
infrastructure or adequate training.
17. Assertion (A): Google search is considered as Reason (R): Taking third party help in
the biggest threat to contemporary libraries. managing the software through ‘cloud
Reason (R): Now-a-days, users taking help computing’ platform has become inevitable.
from Reference Librarian for factual queries has
considerably decreased. A. (A) is true, but (R) is false
B. (A) is false, but (R) is true
A. (A) is true, but (R) is false C. Both (A) and (R) are true
B. (A) is false, but (R) is true D. Both (A) and (R) are false
C. Both (A) and (R) are true
D. Both (A) and (R) are false Answer: A

Answer: B 21. Assertion (A): There has been a demand for


data exchange between library catalogues and

73 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

databases with records of documentary Reason (R): Access via IP-address presents
information. challenge in controlling the distribution of
Reason (R) : Interoperatability leads to password to non-affiliates.
information reuse as a requisite to access data,
and takes into account quality, contents, A. (A) is true, but (R) is false
knowledge, products and services. B. (A) is false, but (R) is true
C. Both (A) and (R) are true
Library Info

Library Info
A. (A) is true, but (R) is false D. Both (A) and (R) are false
B. (A) is false, but (R) is true
C. Both (A) and (R) are true Answer: D
D. Both (A) and (R) are false 25. Assertion (A): Web search engines get their
Answer: C information by crawling from site to site.
Reason (R): The ‘Spider’ checks for the
22. Assertion (A): Librarians usually prefer to standard file name spider.avi addressed to it
provide access to e-content for the users via a before sending certain information back to the
proxy server, allowing authrorized library users indexed.
to access content from outside the physical A. (A) is true, but (R) is false
confines of a library. B. (A) is false, but (R) is true
Reason (R): Proxy-server access is possible C. Both (A) and (R) are true
without IP-address recognistion. D. Both (A) and (R) are false

A. (A) is true, but (R) is false Answer: A


B. (A) is false, but (R) is true
26. Statement (A): Static RAM (SRAM) is faster,
C. Both (A) and (R) are true expensive and consumes more power
D. Both (A) and (R) are false Statement (B): Dynamic RAM (DRAM) is
Answer: A faster, expensive and consumes more power.
A. (A) is true, but (B) is false
23. Assertion (A) : Libraries are changing in the B. (A) is false, but (B) is true
wake of emerging ICT environment. C. Both (A) and (B) are true
Reason (R) : Libraries are adopting new D. Both (A) and (B) are false
competencies to operate services in the
environment of information super highways. Answer: A

27. Statement (A): ROM is used when computer


A. (A) is true, but (R) is false starts booting
B. (A) is false, but (R) is true Statement (B): ROM memory cannot be easily
C. Both (A) and (R) are true modified.
D. Both (A) and (R) are false

Answer: C A. (A) is true, but (B) is false


B. (A) is false, but (B) is true
24. Assetion (A): Access to e-collection of a library C. Both (A) and (B) are true
via login and password recognition is mostly D. Both (A) and (B) are false
used than access via IP-address
Answer: C

74 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

28. Assertion (A): On decompression of a


compressed zip file, the data loss is minimal.
Reason (R): Zip data compression technique is
based on lossy compression.
A. Both (A) and (R) are true and (R) is the
correct explanation of (A)
B. Both (A) and (R) are true and (R) is
Library Info

Library Info
NOT the correct explanation of (A)
C. (A) is true but (R) is false
D. (A) is false but (R) is true

Answer: C

75 AQUIL AHMED
Library Info

UNIT -VIII

Library Info
Computer Technology: Library Automation & Digitization Unit -VIII

Library Automation b) Acquisitions


c) Circulation
1. Who coined the term ‘automation’? d) Reference service
A. Tim Berners Lee
B. D. S. Harder A. a and b are correct
C. Ray Tomlinson B. a, c and d are correct
D. Ted Nelson C. b, c and d are correct
Library Info

Library Info
D. b and c are correct
Answer: B (D. S. Harder)
Answer: D
Notes: D.S. Harder, General Motor Company, USA, was
the first who coined the term ‘Automation’ in the year 5. What does LSP stand for?
1936. A. Library Services Platform
B. Library Services Provider
2. The word ‘automation’ is derived from which C. Library Software Provider
language? D. Library Serials Provider
A. Greek
B. Latin Answer: A (Library Services Platform)
C. Spanish
D. Russian 6. Who among the following has coined the term
‘Library Service Platform (LSP)’ in 2011?
Answer: A (Greek) A. Joshua Ferraro
B. Christopher Cormack
Notes: The word ‘Automation’ has been derived from C. Marshal Breeding
the Greek word ‘Automose’, meaning something which D. None of the above
has the power of spontaneous motion or self movement.
Answer: C (Marshal Breeding)
3. What is called the state of using computers in
the functions, activities and services in the Notes: Renowned library technologist and consultant
libraries? Marshal Breeding coined the term ‘Library Services
A. Automatic library Platform (LSP)’ in the year 2011 to describe a new set of
B. Library operations products that were being developed to take a much
C. Library functions different approach to library resource management with
D. Library automation a set of new characteristics that the incumbent integrated
library systems (ILSs). According to Breeding, a
Answer: D (Library automation) Library Services Platform (LSP) is the ‘next
Notes: Library Automation is the application of ICTs to generation’ of library management systems that
library operations and services. In the simple language, provide the capabilities to better manage our collections
we can define “When we use machineries for collection, in all formats, and handle the ever-growing means of
processing, storage and retrieval of information and access to electronic resources and print materials.
perform other works of library with the help of 7. Select the correct sequence of data storage
machineries that is called library automation.” hierarchy:
4. The term library automation generally A. Bytes, bits, fields, records, files and
encompasses the computerization of __. databases
a) Bibliography compilation B. Bits, bytes, fields, files, records and
databases
76 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

C. Bits, bytes, records, fields, files and A. c, and d are correct


databases B. a, and c are correct
D. Bits, bytes, fields, records, files and C. b and c are correct
databases D. b and d are correct

Answer: D Answer: C

8. Which is the proper hierarchy in the 11. NewGenlib originated from which country?
Library Info

Library Info
organization of data? A. India
A. Database - File - Record - Field - Character - B. New Zealand
Bit – Byte C. America
B. Database - Record - File - Field - Byte - D. France
Character – Bit
C. Database - File - Record - Character - Field - Answer: A (India)
Byte – Bit
Notes: NewGenlib, an integrated library management
D. Database - File - Record - Field - Character - system developed by Sidhartha Errabolu and L.J.
Byte – Bit Haravu from Verus Solutions Pvt Ltd., first released
Answer: D in 2005. Domain expertise is provided by Kesavan
Institute of Information and Knowledge Management
Notes: A database is a collection of files, a file is made (KIIKM), Hyderabad – a non-profit trust created in the
up of records, a record is made up of fields, a field is memory of B. S. Kesavan, the first librarian of National
made up of characters, a character is made up of bytes Library of India. NewGenLib was declared free and
and a byte is made up of bits (bit is short form for binary open source under GNU GPL in January 2008.
digit).
12. Arrange the following software according to the
9. Arrange the following in an ascending order: chronological sequence of their launching:
a) Database a) KOHA
b) Field b) New Genlib
c) File c) CDS/ISIS
d) Record d) LibSys
A. (a), (d), (c) and (b)
B. (c), (a), (d), and (b) A. (a), (b), (c) and (d)
C. (b), (d), (c) and (a) B. (c), (a), (d), and (b)
D. (d), (a), (b) and (c) C. (c), (d), (a) and (b)
D. (d), (a), (b) and (c)
Answer: C
Answer: C
10. Which of the following are the performance
indicators used to measure libraries in electronic Notes: CDS/ISIS (1985, UNESCO); LibSys (1988,
measurement? LibSys Corporation, Gurgaon); KOHA (2000, Katipo
a) Accuracy of classification system Communications); NewGenlib (2005, Verus Solutions
b) Information content available on the Pvt Ltd. )
network
c) Information tools and services 13. What is CDS/ISIS?
d) Quantum of staff in the library A. A word processing software
B. An information storage and retrieval system
77 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

C. A spreadsheet Answer: D (NISSAT)


D. A programming language
18. E-Granthalaya is developed by ____.
Answer: B (An Information storage and retrieval A. NCERT
software) B. CSIR
C. DRDO
Notes: CDS/ISIS (Computerized Documentation D. NIC
System/Integrated Set of Information Systems) is a
Library Info

Library Info
generalized Information Storage and Retrieval Systems Answer: D (NIC)
developed, maintained and disseminated by UNESCO.
First released in 1985 (Dos Based). A Window version Notes: E-Granthalaya- an integrated LMS, was started
of CDS/ISIS (WINISIS) was first distributed for testing as an in-house project at ‘Karnataka State Centre of NIC,
in May 1995 and the first version officially released in Bangalore and first version of the software designed for
November 1998. ISISMarc is basically a data entry the public libraries came out in 2003.Later on, NIC
interface for CDS/ISIS databases that work on headquarter, New Delhi took over the development of
Windows. ISISMarc was developed with the support of the software. Version 4.0 (2015) is a ‘Cloud Ready
Library of Congress. Application’ and provides a Web-based data entry
solution with a centralized database for cluster of
14. In CDS/ISIS ‘delimiters’ means: libraries. It is UNICODE compliant software that
A. Field address supports data entry in local languages.
B. Field repeatability
19. Which among the following is NOT an Open
C. Field format
source ILS?
D. Subfield indicators A. Koha
Answer: D (Subfield indicators) B. Evergreen
C. NewGenLib
15. CDS/ISIS uses __. D. E-Granthalaya
A. Fixed field length
B. Variable field length Answer: D (E-Granthalaya)
C. Controlled field length
Notes: E-Granthalaya comes under freeware. Freeware
D. None of the above
means that though the software is free, but its source
Answer: B code is not openly available for modification.

16. Windows version of CDS/ISIS is named as __. 20. Arrange the following library software in
A. WINISIS ascending order according to their year of
B. WISIS launching:
C. Windows ISIS a) PhpMyLibrary
D. WINCDS b) ABCD
c) Koha
Answer: A (WINISIS) d) NewGenLib
17. CDS/ISIS was distributed in India by __.
A. (d), (c), (b) and (a)
A. INSA
B. (c), (a), (d), and (b)
B. INSDOC
C. (c), (d), (b) and (a)
C. NISCAIR
D. (d), (a), (b) and (c)
D. NISSAT

78 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

Answer: B Answer: B (Philippines)

Notes: Koha (2000); PhpMyLibrary (2003); NewGenLib Notes: PhpMyLibrary is an open source PHP MySQL
(2005); ABCD (2010) based Library automation application. The program
consists of cataloging, circulation, and Web OPAC
21. ABCD library automation software was modules. It was developed by Polerio T. Babao III as
developed in __. his academic undergraduate thesis in the Institute of
A. Australia Library and Information Science, University of the
Library Info

Library Info
B. Brazil Philippines, Diliman and first released for general use
C. France in 2003.
D. Russia
24. PhpMyBibli (PMB) open source ILS was
Answer: B (Brazil) developed in __.
A. France
Notes: ABCD (Automation of Libraries and
B. Philippines
Documentation Centers) is a comprehensive Web-
enabled integrated library automation system developed C. Russia
by BIREME, Brazil in 2010. It is based on CDS/ISIS as D. Germany
back end databases and WWWISIS as middle-ware. It is Answer: A (France)
a freeware ILS that contains Cataloging, Circulation,
Acquisitions, Statistics and Reports and OPAC modules. Notes: PMB (PhpMyBibli) is Web-based open
source ILS that uses XAMPP architecture. The
22. Which among the following ILS is supported by PMB ILS project was started by François
UNESCO? Lemarchand in October 2002, the then Director of
A. WEBLIS the Public Library of Agneaux, France. Presently it
B. KOHA is managed by PMB Services, an initiative to
C. NEWGENLIB support open source software. The first version was
D. PHPMYADMIN released in the year 2003 and the current version is
4.1 (released in March 2014).
Answer: A (WEBLIS)
25. OpenBiblio – an open source integrated
Notes: WEBLIS stands for Web based Library and
library system was first created in the year __.
Information System. This Web based ILS is based on A. 2000
CDS/ISIS. It has been developed by the Institute for B. 2001
Computer and Information Engineering (ICIE), C. 2002
Poland. It is freeware ILS and provides basic library D. 2003
workflow support through four modules – Cataloguing
system, OPAC (search), LOAN module, Statistical Answer: C (2002)
module.
Notes: Openbiblio was created in 2002 by Dave
23. PhpMyLibrary automation software was Stevens. This free open source software is much
developed in __. popular with small and rural libraries worldwide
A. France and now maintained by Hans Van der Weij, current
B. Philippines project manager.
C. Russia
A. Germany 26. Open-Source Automated Library System
(OPALS) is created primarily for __.
79 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

A. School libraries c) SOUL


B. Special libraries d) E-Granthalaya
C. Government libraries A. (a), (b), (c) and (d)
D. Public libraries B. (b), (a), (c), and (d)
C. (c), (d), (a) and (b)
Answer: A (School Libraries) D. (d), (a), (b) and (c)
Notes: OPALS (OPen Source Automated Library
Answer: B
Library Info

Library Info
System) was created primarily for the K–12 school
library automation market and was open source from its Notes: SLIM (First released in 1988; Algorithm
inception. Media Flex company, New York developed Consultants Pvt Ltd. established in Pune in 1986);
this software based on MySQL, Perl, and Zebra and was Sanjay (1995; DESIDOC); SOUL (2000; INFLIBNET);
operational since 2003.
E-Granthalaya (2003; NIC)

27. Evergreen Open Source ILS was developed by __. 30. Select the Library automation systems
A. California Public Library System, USA developed by DESIDOC:
B. Georgia Public Library Service, USA A. DELMS
C. Florida Public Library System, USA B. Suchika
D. None of the above C. Sanjay
D. All the above
Answer: B (Georgia Public Library Service, USA)
Answer: D
Notes: Evergreen is an open source Integrated Library
System (ILS), initially developed by the Georgia Public Notes: DELMS (Defence LibraryManagement System)
Library Service, United States. The software is based was developed by DESIDOC in 1988. Sanjay Library
on Linux operating system and the first version was Software, is developed by DESIDOC in 1995. The
released in September 2006. software was based on CDS/ISIS and sponsored and
marketed by NISSAT. Suchika software was developed
28. Dolphin 4.3 is ___. in 1996 by DESIDOC.
A. A fully integrated and multiuser library
automation software 31. Which among the following library management
B. An operating system software were developed by INFLIBNET?
C. A database of South African Birds a) ILMS
D. A single user LIS Software b) CATMAN
c) SOUL
Answer: A (A fully integrated and multiuser library d) Granthalaya
automation software) A. a, and d are correct
Notes: Dolphin is a high performance, fully integrated B. a, and c are correct
and multi user library automation software for C. b, and d are correct
Windows-98-ME-NT-2000 and XP. It is developed by D. c, and d are correct
Dolphinox company based in Bhopal, Madhya Pradesh. Answer: B
29. Arrange the following software according to Notes: CATMAN and Granthalaya Library management
their chronological sequence of their launching: systems were developed by INSDOC (NISCAIR).
a) Sanjay
b) SLIM 32. Select the correct combinations:

80 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

a) LIBSYS – Libsys Pvt Ltd. D. b and d are correct


b) Maitrayee – CALIBNET
c) SOUL – INFLIBNET Answer: A
d) OASIS – Soft Link 36. Identify the odd one from the following:
A. a, b and d are correct A. Koha
B. a, b and c are correct B. Libsys
C. b, c and d are correct C. SLIM 21
Library Info

Library Info
D. a, b, c, and d are correct D. SOUL
Answer: D Answer: A (Koha)
Notes: CMC Ltd., Calcutta has developed Notes: SLIM (System for Library Information
MAITRAYEE for CALIBNET project. Management) is commercial ILS software developed by
33. Select the correct combinations: Algorithms Consultants Pvt. Ltd., Pune. The first
a) LIBSYS – Libsys Pvt Ltd. version came out in 1988 and its latest version is
b) E-Granthalaya – NIC SLIM21.
c) New Genlib – Verus Solutions 37. Arrange the following library software in
d) ALICE – Soft Link ascending order according to their year of first
A. a, b and d are correct launching:
B. a, b and c are correct a) Koha
C. b, c and d are correct b) Evergreen
D. a, b, c, and d are correct c) SOUL
Answer: D d) NewGenLib

34. Which of the following are NOT open source A. (d), (c), (b) and (a)
software? B. (c), (a), (d), and (b)
a) KOHA C. (c), (d), (b) and (a)
b) LIBSYS D. (d), (a), (b) and (c)
c) NEW GENLIB
d) VIRTUA Answer: B
A. c, and d are correct Notes: SOUL (February 2000); (Koha (July 2000);
B. a, and c are correct NewGenLib (2005); Evergreen (2006)
C. b and c are correct
D. b and d are correct 38. When SOUL 2.0 was released?
A. January 2009
Answer: D B. January 2010
35. Which of the following are open source ILMS? C. July 2011
a) E-prints D. October 2012
b) GSDL Answer: A (January 2009)
c) KOHA
d) NEW GENLIB Notes: Software for University Libraries (SOUL) is
A. c, and d are correct an state-of-the-art integrated library management
B. a, and c are correct software designed and developed by the INFLIBNET
C. b and c are correct Centre based on requirements of college and university
81 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

libraries. The first version (SOUL 1.0) was released Answer: C (Zebra)
during CALIBER 2000. The latest version of the
software i.e. SOUL 2.0 was released in January 2009 Notes: Zebra is a high-performance, general-purpose
and contains six modules: Acquisition, Cataloguing, structured text indexing and retrieval engine. Koha
Circulation, Serial Control, OPAC and Administration. databases are indexed by the Zebra Search and
braries. This software works on the client server mode in retrieval engine. It reads structured records in a variety
the windows environment using MS SQL server as back of input formats (eg. email, XML, MARC) and allows
access to them through exact boolean search
Library Info

Library Info
end tool to store and retrieve data. network. INFLIBNET
has established five service centres for SOUL in the expressions. Zebra is free software, available under
States at Mumbai, Patiala, Ahmedabad, Hyderabad the GPL license. It supports large databases and data
and Bangalore. stored in Zebra can be accessed through Z39.50 clients.

39. SOUL 3.0 is released in __. 42. Which of the following is NOT a plagiarism
A. 2018 detection system?
B. 2019 A. Copy Leaks
C. 2020 B. Viper
D. 2021 C. Paper Rater
D. Zebra
Answer: D (2021)
Answer: D (Zebra)
Notes: SOUL 3.0 is released in February 2021 and its
database is based on the latest version of MySQL. SOUL Notes: Zebra is an open source, general-purpose
3.0 is compliant to international standards such as structured text indexing and retrieval engine. It reads
MARC 21 bibliographic format, Unicode based structured records in a variety of input formats (eg.
Universal Character Sets for multilingual bibliographic email, XML, MARC) and allows access to them through
records and NCIP 2.0 and SIP 2 based protocols for exact Boolean search expressions and relevance-ranked
electronic surveillance and control. free-text queries.

40. Which of the following Library Automation 43. KOHA is written in which of the following
software is developed by Softlink? language?
A. Koha A. C, C++
B. E-Granthalaya B. Java
C. Alice C. Karel ++
D. New Genlib D. Perl

Answer: C (Alice) Answer: D (Perl)

Notes: Alice for Windows an integrated library Notes: Koha is an open source integrated library
automation software package, developed in 1983, is the Management System (ILMS) developed by Katipo
product of Softlink, established in Brisbane, Australia. Communications, New Zealand and first released in
January 2000. It is now maintained and developed by
41. Which search engine is used in KOHA? KOHA Community. Koha is based on LAMP
A. Lucene architecture. LAMP stands for Linux, Apache,
B. Solr MySQL, Perl. Koha runs on Linux operating system,
C. Zebra uses Apache as web server and MySQL as database to
D. Star store records. It is released as open source under GNU
General Public License.
82 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

44. Which one of the following List options is not Notes: Zebra, Solr, Lucene and MGPP are open source
available in Koha? Search Indexing tools.
A. Direct List
B. Public List 47. Select the correct combinations:
C. Private List a) Data Harmony – Thesaurus
D. Open List b) SUCHIKA – DESIDOC
c) Librarian’s Index to the Internet – Subject
Answer: A (Direct List) Directory
Library Info

Library Info
d) Dialindex – Database of Databases
45. Which among the following are the service A. c, and d are correct
providers for Koha ILS? B. a, and c are correct
a) Liblime C. b and c are correct
b) ByWater Solutions D. a, b, c, and d are correct
c) EBSCO
d) OCLC Answer: D
A. a, and d are correct
B. c and d are correct Notes: Data Harmony offers a full suite of software tools
C. b and c are correct for managing metadata, including software for automatic
D. a and b are correct indexing and taxonomy management.

Answer: D 48. EULA stands for ___.


A. E-monitoring library for Academics
Notes: LibLime, founded in 2005 and headquartered in B. End User Logistics Association
Maryland, USA, is a commercial company providing C. Electronic Usage of Library Acquisitions
implementation and development services for Koha ILS. D. End User License Agreement
A Liblime variant of Koha based on Koha 3.0 was
released in 2009, titled ‘Liblime Koha’. Another variant Answer: D (End User License Agreement)
version came out in 2011.
Notes: In proprietary software, an end-user license
ByWater Solutions is a privately owned, California, agreement (EULA) or software license agreement is
USA based company founded in March 2009 by CEO the contract between the licensor and purchaser,
Brendan A. Gallagher and EVP Nathan A. Curulla, establishing the purchaser's right to use the software.
which provides implementation, hosting, support, 49. YAZ toolkit is used for __.
consultation, and development services for the Koha A. Z39.50
Integrated Library System. B. MARC-21
46. Select the correct combinations: C. UNIMARC
a) Koha – Zebra D. None of the above
b) DSpace – Lucene and Solr Answer: A (Z39.50)
c) Greenstone – Lucene and MGPP
d) VUFind – Solr Notes: YAZ is a C/C++ programmer's toolkit supporting
A. c, and d are correct the development of Z39.50 clients and servers. The YAZ
B. a, and c are correct toolkit offers several different levels of access to the
C. b and c are correct ISO23950/Z39.50, SRU and ILL protocols.
D. a, b, c, and d are correct
50. Protocol standard for Resource discovery is __.
Answer: D A. Z39.50
83 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

B. ISO 10106 Answer: D (Accessing Bibliographic Databases)


C. CCF
D. ISO 9000 Notes: Z39.50 is an international standard client-server,
application layer communications protocol for
Answer: A (Z39.50) searching and retrieving information from a database
over a TCP/IP computer network. It is covered by
51. Z39.50 protocol is used to __. ANSI/NISO standard Z39.50, and ISO Standard 23950.
A. Preserve data for longer period The standard’s maintenance agency is the Library of
Library Info

Library Info
B. Search and retrieve information from other Congress.
databases
C. access hidden/password protected data 56. Which of the following are protocol standards?
D. locate and identify error in databases a) Z39.50
b) Z39.71
Answer: B (Search and retrieve information from c) Z39.05
other databases) d) Z39.81
52. What is the major retrieval protocol used by A. a, b and d are correct
Federated search? B. a, c and d are correct
A. Z39.50 Protocol C. b, c and d are correct
D. a, b, c, and d are correct
B. File Transfer Protocol (FTP)
C. Simple Mail Transfer Protocol (SMTP) Answer: A
D. None of the above
Notes: ANSI/NISO Z39.50 (ISO 23950) – 2003
Answer: A (Z39.50 Protocol) (International Standard client-server, application layer
53. The International standard used in library communication protocol for searching and retrieving
management software for information search and information from a database over a TCP/IP
computer network); ANSI/NISO Z39.71-2006
retrieval is __.
(Revised 2011) is a holdings display standard protocol
A. HTTP
B. SMTP for bibliographical records; ANSI/NISO Z39.81 –
C. Z39.50 2001 (Revised now, ANSI/NISO Z39.83 – 2012) is a
D. TCP/IP Circulation Interchange Protocol.

Answer: C (Z39.50) 57. Select the correct combinations:


a) SRW – Search/Retrieve Web Service
54. 'Z39.50' refers to the International Standard __. b) SRU – Search/Retrieve via URL
A. ISO 23950 c) Z39.50 – Protocol for searching and
B. ISO 9960 retrieving information from a database
C. ISO 26324 d) OAI-PMH – Open Archives Initiative
D. ISO 2788 Protocol for Metadata Harvesting
A. c, and d are correct
Answer: A (ISO 23950) B. a, and c are correct
C. b and c are correct
55. What does Z39.50 protocol used for __?
D. a, b, c, and d are correct
A. Accessing websites
B. Sending data to servers Answer: D
C. Connecting to switching devices
D. Accessing bibliographic databases
84 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

Notes: Z39.50 is an international standard client– Notes: ISO 25964 is an International Standard for
server, application layer communications protocol for Thesauri.
searching and retrieving information from
a database over a TCP/IP computer network. It is 60. Select the correct combinations:
covered by ANSI/NISO standard Z39.50, a) Memex – Vannever Bush
and ISO standard 23950. The standard's maintenance b) BALLOTS – Stanford University
agency is the Library of Congress. The successors to c) SRU – Library of Congress
d) KWIC – H. P. Luhn
Library Info

Library Info
Z39.50 are the twin protocols developed by Library of
Congress: SRU (Search/Retrieve via URL) and A. c, and d are correct
SRW (Search/Retrieve Web service) B. a, and c are correct
C. b and c are correct
58. Which agency looks after the maintenance of D. a, b, c, and d are correct
SRU and SRW standards?
A. OCLC Answer: D
B. Library of Congress Notes: In 1968, Stanford University started two joint
C. IFLA projects: BALLOTS (Bibliographic Automation of
D. British Library Large Library Operations Using Time-Sharing
Answer: B (Library of Congress) System) – a library automation programme and SPIRES
(Stanford Physics Information Retrieval System) – an
Notes: SRU (Search/Retrieve via URL) is a standard information retrieval system.
XML based search protocol for Internet search queries.
It is a client-server protocol where the client sends SRU (Search/Retrieval via URL) - is a standard XML-
URL-encoded query parameters to the server and based protocol developed by Library of Congress for
receives an XML encoded list of records as a result. search queries, utilizing CQL (Contextual Query
SRW (Search Retrieve Web Service) is a web service Language).
for search and retrieval, a companion protocol to SRU. 61. Select the correct combinations:
Queries in SRU and SRW are expressed using a) SOA – A style of software design
the Contextual Query Language (CQL), a standard b) SaaS – Software is licensed on a
syntax for representing queries. The Library of subscription basis and is centrally hosted
Congress serves as the maintenance agency for these c) SRU/SRW – a web-based information
standards. retrieval protocol
59. Select the correct combinations: d) OAI/PMH – A metadata harvesting protocol
a) ISO 25964 – Thesaurus development A. c, and d are correct
b) ISO 2709 – Exchange of bibliographic data B. a, and c are correct
c) Z 39.50 – Searching and retrieving C. b and c are correct
information from bibliographic databases D. a, b, c, and d are correct
d) Z 39.85 – DC metadata encoding Answer: D
A. a and d are correct
B. b and c are correct Notes: Service-Oriented Architecture (SOA) is a style
C. a and b are correct of software design where services are provided to the
D. All are correct
other components by application components, through a
Answer: D communication protocol over a network. It is a way to
make software components reusable via service
interfaces. SOA is well-suited for large, complex,
85 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

enterprise-wide systems that require integration with 64. Lucene-full text information retrieval software
many heterogeneous applications and services was originally developed by:
A. Doug Cutting
62. Which OAI-PMH verb responds with information B. Peter Merholz
about a repository? C. Chester Cardson
A. Inform D. John Benjamin Dancer
B. Identify
C. Enquire Answer: A (Doug Cutting)
Library Info

Library Info
D. None of the above
Notes: Apache Lucene is a free and open-source
Answer: B (Identify) information retrieval software library, originally written
completely in Java by Doug Cutting in 1999. It is
Notes: Open Archives Initiative Protocol for supported by the Apache Software Foundation and is
Metadata Harvesting (OAI-PMH) specifies how released under the Apache Software License.
metadata is structured and presented for ingestion by
external services, usually on the Internet. OAI-PMH 65. UNIMARC was developed by __.
metadata is encoded in extensible markup language A. Library of Congress
(XML) format. OAI-PMH records are harvested B. IFLA
using HTTP requests. OAI-PMH includes a set of six C. FID
commands (called verbs) that are invoked within D. UNESCO
HTTP. They are:
Answer: B (IFLA)
GetRecord – Used to retrieve an individual metadata
record. Notes: The UNIMARC Bibliographical format was first
created and proposed by IFLA in 1977, with the title
Identify – Used to retrieve repository information (ex. UNIMARC: Universal MARC format. The primary
name, version). purpose of UNIMARC is to facilitate the international
exchange of data in machine-readable form between
ListIdentifiers – Used to retrieve only headers. national bibliographic agencies. This was followed by
ListMetadataFormats – Used to retrieve the available a second edition of UNIMARC in 1980 and a
UNIMARC Handbook in 1983. The third and current
metadata formats.
edition was published in 2008, in book format.
ListRecords – Used to retrieve actual item metadata
records. 66. UNIMARC is based on __.
A. ISSN
ListSets – Used to retrieve the set structure of a B. ISBN
repository C. ISBD
D. METS
63. Which OAI-PMH verb displays the supported
metadata schema? Answer: C (ISBD)
A. List Metadata Formats
B. List Metadata 67. CANMARC and US-MARC are merged
together with __.
C. List Metadata Schema
A. CCF
D. None of the above
B. UNIMARC
Answer: A (List Metadata Formats) C. UK-MARC
D. MARC-21
86 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

Answer: D (MARC-21) Format, Classification Data Format, Holdings Data


Format and Community Information Data Format.
Notes: MARC is an acronym That’s why MARC 21 is also called ‘A family of Five
for MAchine Readable Cataloging. MARC Standards’. Each of these MARC formats is published
standards are a set of digital formats for the description separately to provide detailed field descriptions,
of items catalogued by libraries. The original MARC guidelines for applying the defined content designation
format was developed at the Library of Congress in (with examples), and identification of conventions to be
1965-66 leading to a pilot project by an American
Library Info

Library Info
used to insure input consistency.
Computer Scientist, Henriette Avram, known as
MARC I, which had the aim of investigating the 69. Who is considered as the ‘mother of
feasibility of producing catalogue data in machine- MARC’(declared by Library of Congress in
readable form. The second pilot project was initiated in 2006)?
1968 called MARC II. MARC II was later split into two A. Henriette Avram
formats - BNB MARC (later UK MARC) and US B. Carla Hayden
MARC. The USMARC format becomes the U. S. C. Laura Welch Bush
National Standard in 1971 (ANSI Z39.2) and an D. Beverly Cleary
International Standard in 1973 (ISO 2709).
Answer: A (Henriette Avram)
MARC 21 was created in 1999 as a result of the
harmonization of USMARC, and CANMARC 70. Which of the following are the parts of MARC
(Canadian MARC) formats. MARC 21 is the most record structure?
extensively used MARC format in the world and a de a) Check digit
facto standard. MARC21 is based on the international b) Leader
standard Format for Information Exchange (ISO 2709) c) Directory
and its American counterpart, the NISO/ANSI standard d) Record Terminator
Z39.2, which allows users of different software products A. a, b and d are correct
to communicate with each other and to exchange data. B. a, b and c are correct
MARC 21 allows the use of two character sets, either C. b, c and d are correct
MARC-8 or Unicode encoded as UTF-8. MARC-8 is D. a, b, c, and d are correct
based on ISO 2022 and allows the use of Hebrew, Answer: C
Cyrillic, Arabic, Greek, and East Asian scripts. MARC
21 in UTF-8 format allows all the languages supported Notes: MARC bibliographic record structure consists of
by Unicode. The current maintenance agency for MARC three main components: the Leader, the Directory, and
21 is the Library of Congress. the variable fields. The Leader is fixed in length at 24
character positions and is the first field of a MARC
68. MARC 21 provides how many types of data record. The leader data elements contain numbers or
communication formats? coded values that primarily provide information for the
A. 2 processing of the record. Following the leader is
B. 4 the directory, which is an index to the location of
C. 5 the variable fields (both control and data fields) within
D. 7 the record. Each entry is 12 character positions in
Answer: C (5) length. In MARC Structure, Directory is followed by
variable fields that are of two types: (a) Variable
Notes: There are five MARC 21 data communication Control fields – Variable control fields (00X fields)
formats: Bibliographic Data Format, Authority Data may contain either a single data element or a series of
87 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

fixed-length data elements identified by relative electronic resource. The information identifies the
character position; (b) Variable Data Fields - Following electronic location containing the resource or from
the control fields are data fields, which contain general which it is available.
data. Variable Data fields are identified by a 3 character
field tag. Each field contains indicators and subfield 73. The tag 300 in MARC 21 indicates:
A. Edition statement
codes, as well as data and at the end a Field Terminator
B. Physical description
(FT). A Record Terminator (RT), ASCII control C. General note
Library Info

Library Info
character 1D (hex), is used as the final character of the D. Series statement
record. Answer: B (Physical description)
71. As per ISO-2709 the sequence of elements in
bibliographic record structure is __. 74. Tag 760 in MARC deals with __.
a) Directory A. Main Series Entry
b) Data fields B. The Edition
C. The Publication Information
c) Record label
D. A topical subject heading
d) Record separator
A. (a), (b), (c) and (d) Answer: A (Main Series Entry)
B. (c), (a), (b), and (d)
C. (c), (d), (a) and (b) 75. Which of the field in MARC 21 contains the
D. (d), (a), (b) and (c) DDC number?
A. 082
Answer: B B. 084
C. 050
Notes: ISO 2709 is an ISO standard for bibliographic D. 080
descriptions, titled Information and documentation— Answer: A (082)
Format for information exchange. As a format for the
exchange of bibliographic Information, it was developed
76. Select the correct combinations of MARC 21
in the 1960s under the direction of Henriette Avram of
elements with corresponding tags:
the Library of Congress to encode the information
a) Personal Main Entry – 100
printed on library catalogue cards. The current standard
b) Personal Subject Heading – 600
is ISO 2709:2008 which has four sections: Record label
c) Personal Added Entry – 700
– Directory – Data fields – Record separator. MARC
d) Subject Added Entry (Topical Term) – 650
is an example of ISO 2709 standards.
A. a, b and d are correct
72. Which among the following MARC tags are B. a, b and c are correct
used to enable full-text search and linking to C. b, c and d are correct
full-text resources? D. a, b, c, and d are correct
A. 250
Answer: D
B. 945
C. 856 77. Select the correct combinations of MARC 21
D. 830 Control fields:
a) 005 – Date and Time of Latest Transaction
Answer: C (856)
b) 006 – Fixed Length Data Elements –
Notes: 856 – Electronic Location and Access. This tag Additional Material Characteristics
helps to identify Information required to locate an c) 007- Physical Description Fixed Field

88 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

d) 008 – Fixed-Length Data Elements – A. a, b and d are correct


General Information B. a, b and c are correct
A. a, b and d are correct C. b, c and d are correct
B. a, b and c are correct D. a, b, c, and d are correct
C. b, c and d are correct
D. a, b, c, and d are correct Answer: D

Answer: D 81. Select the correct combinations of MARC-21


Library Info

Library Info
elements with corresponding tags:
Notes: Control fields in MARC 21 formats are assigned a) ISBN – 020
tags that begin with two zeros. MARC 21 Control b) ISSN – 022
Fields 001-008 contain the record control number and c) Cataloguing source – 040
other coded information that are used in processing d) Language Code – 041
MARC authority records. A. a, b and d are correct
B. a, b and c are correct
78. Select the correct combinations of MARC-21 C. b, c and d are correct
elements with corresponding tags: D. a, b, c, and d are correct
a) Uniform Title – 240
b) Main Title Statement – 245 Answer: D
c) Varying Form of Title – 246
d) Former Title – 247 82. Select the correct combinations of MARC-21
A. a, b and d are correct elements with corresponding tags:
B. a, b and c are correct a) Library of Congress Call No. – 050
C. b, c and d are correct b) Universal Decimal Classification No. – 080
D. a, b, c, and d are correct c) Dewey Decimal Classification No. – 082
d) ISBN Number – 020
Answer: D A. a, b and d are correct
B. a, b and c are correct
79. Select the correct combinations of MARC-21 C. b, c and d are correct
elements with corresponding tags: D. a, b, c, and d are correct
a) ISBN – 020
b) ISSN – 022 Answer: D
c) Cataloguing source – 040
d) Language Code – 041 83. Select the correct combinations of MARC-21
A. a, b and d are correct elements with corresponding tags:
B. a, b and c are correct a) Edition Statement – 250
C. b, c and d are correct b) Imprint Details – 260
D. a, b, c, and d are correct c) Physical Description – 300
d) Series Statement – 490
Answer: D A. a, b and d are correct
B. a, b and c are correct
80. Select the correct combinations of MARC 21 C. b, c and d are correct
elements with corresponding tags: D. a, b, c, and d are correct
a) Personal Main Entry – 100
b) Personal Subject Heading – 600 Answer: D
c) Personal Added Entry – 700
d) Subject Added Entry (Topical Term) – 650 84. CCF was developed by __.
89 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

A. ILA c) Z39.71 – Standard for holding statements


B. ALA d) Z39.83 – NISO Circulation Interchange
C. IFLA Protocol (NCIP)
D. UNESCO A. a, b and d are correct
B. a, b and c are correct
Answer: C (UNESCO) C. b, c and d are correct
D. a, b, c, and d are correct
Notes: Common Communication Format (CCF),
Library Info

Library Info
developed by UNESCO/PGI is a structure format for Answer: D
creating bibliographical records and for exchanging
records between groups of information agency and 88. Select the correct combinations:
libraries. The first edition of CCF was published in 1984 a) MARCXML – MARC data in an XML
under the editorship of Peter Simmons and Alan Structure
Hopkins and its second edition was published in 1988 in b) MODS – Metadata Object Description
two volumes called CCF/B (Common Communication Standard
Format for Bibliographic Information) and CCF/F c) MADS – Metadata Authority Description
(Common Communication Format for Factual Standard
Information). The structure of CCF is the d) METS – Metadata Encoding &
implementation of ISO-2709. It consists of the Transmission Standard
following: a) Record b) Directory c) Data Fields A. a, b and d are correct
B. a, b and c are correct
85. Common Communication Format (CCF) is C. b, c and d are correct
based on __. D. a, b, c, and d are correct
A. ISO 2709
B. ISO 2079 Answer: D
C. ISO 2907
D. ISO 2970 Notes: Some of the non-formal standards developed by
the Library of Congress are: MARCXML - MARC 21
Answer: A (ISO 2709) data in an XML structure (developed by Library of
Congress) acting as base standard for bibliographic data
86. Select the correct combinations export/import in place of ISO-2709. METS (Metadata
a) ISO-2709 – Bibliographic data exchange Encoding & Transmission Standard) – Structure for
b) MARC 21 – A family of five standards encoding descriptive, administrative, and structural
c) CCF – UNESCO/PGI metadata developed by Library of Congress. PREMIS
d) UNIMARC – IFLA (Preservation Metadata) – A data dictionary and
A. a, b and d are correct supporting XML schemas for core preservation metadata
B. a, b and c are correct needed to support the long-term preservation of digital
C. b, c and d are correct materials. It was also developed by Library of Congress.
D. a, b, c, and d are correct SRU/SRW (Search and Retrieve URL/Web Service) –
Answer: D Web services for search and retrieval based on Z39.50
(developed by Library of Congress). OAI/PMH
87. Select the correct combinations: Version 2.0 – Open Archive Initiative/Protocol for
a) Z39.50 – Standard for distributed Metadata Harvesting (developed by Open Archive
cataloguing Initiative).
b) ISO2709 – Bibliographic data
89. In MARC 21, a delimiter may be __.
interoperability
90 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

A. Double dagger ( ), an "at sign" (@), a Answer: D


dollar sign ($)
92. Which of the following are the advantages of
B. Only a dollar sign ($)
RFID technology in libraries?
C. Only a double dagger ( ) a) Tags can be read inside a case.
D. None of these b) Hundred of tags can be read at a time
c) Cheaper than Barcode
Answer: A
d) More security and Privacy
Library Info

Library Info
Notes: In MARC 21 format, delimiter is a sign. A. a and b are correct
Different software programs use different characters to B. a, b and d are correct
represent the delimiter on the screen or on printouts. C. c and d are correct
Examples are a double dagger ( ), an "at sign" (@), a D. a, and c are correct
dollar sign ($). Answer: A
90. Which of the following statements is true for 93. The main components of an RFID system include:
MARC 21 format? A. Handheld Reader, RFID Label printer,
A. Punctuation that separates subfields is server and External book return
determined by what comes after the B. RFID tags, readers or sensors, Antenna and
punctuation server
B. Punctuation that separates subfields is C. RFID label printer, sensors, antenna and
determined by what comes before the server
punctuation D. RFID tags, server, external book return,
C. Both a and B sensors
D. None of these
Answer: B
Answer: A
94. What is/are common feature/s between RFID &
Notes: In MARC 21 format, punctuation that Barcode Technology?
separates subfields is determined by what comes a) Read more than one item at a time
after the punctuation. For example, when we see " / ", b) Able to locate specific items on shelves
we know a statement of responsibility is going to follow c) Programmable
it. d) Read while item is moving
A. a and b are correct
Barcode and RFID B. a, b and d are correct
91. Radio Frequency Identification is used in library C. c and d are correct
for __. D. All the above are correct
a) Circulation of documents Answer: D
b) Cataloguing of documents
c) Security of documents 95. Advantages of RFID over barcode technology are:
d) Acquisition of documents a) No line of sight required for reading
b) Multiple items can be read with a single
A. a, b and d are correct scan
B. a, b and c are correct c) Individual items are not identified
C. b, c and d are correct d) Each tag can carry a lot of data
D. a, and c are correct
91 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

A. a, b and d are correct into air through an antenna. Antenna: It is a device


B. a, b and c are correct which converts the electrical signal into electromagnetic
C. b, c and d are correct signal which is efficient in propagating the signal in air.
D. a, b, c, and d are correct Decoder: When a RF signal is detected at the antenna
from a tag, the decoder helps in retrieving the data.
Answer: A
RFID Tags, which use radio waves to communicate
Notes: RFID is an acronym for “Radio-Frequency their identity and other information to nearby readers.
Library Info

Library Info
IDentification” and refers to a technology whereby RFID tags can be passive or active. A passive RFID tag
digital data encoded in RFID tags or smart labels are consists of two components – Microchip and an
captured by a reader via radio waves. antenna. Passive tags are powered by the reader and do
96. Which of the following is the ISO standard for not have a battery. Active RFID tags are powered by
library RFID system? batteries, thus it has three components – Microchip,
A. ISO 28650 antenna and batteries.
B. ISO 15396 98. Approximately, how much is the memory
C. ISO 15836 capacity of active RFID tags?
D. ISO 28560 A. 2 KB
B. 4 KB
Answer: D (ISO 28560)
C. 8 KB
Notes: ISO 28560-2:2018 (RFID in Libraries) - This D. 16 KB
document specifies a data model and encoding rules for
Answer: A (2KB)
the use of radio frequency identification (RFID) tags for
items appropriate for the needs of all types of libraries 99. The main components of an RFID Passive tags
(including national, academic, public, corporate, special, include:
and school libraries). A. Transceiver and Decoder
B. Microchip and Antenna
97. RFID reader or Interrogator is a device that
consists of __. C. Antenna and Server
A. Antenna, Transceiver, and decoder D. None of the above
B. Microchip, Battery and Antenna Answer: B (Microchip and Antenna)
C. RFID label Printer, Server and External
book return Notes: A passive RFID tag consists of two components
D. Serial Clock, Microwave, and Package – Microchip and an antenna. Passive tags are powered
by the reader and do not have a battery.
Answer: A (Antenna, Transceiver and decoder)
100. Who among the following invented the barcode
Notes: Radio Frequency Identification (RFID) refers to technology?
a wireless system comprised of two components: RFID A. Sir William Herschel
Tags and RFID Readers. B. Denso Wave
RFID Reader: It is a device which consists of an C. Norman Joseph Woodland and Bernard
antenna, transceiver and a decoder. Transceiver: It can Silver
D. None of the above
be used either as a transmitter or a receiver. It consists of
an oscillator to generate a continuous signal which is Answer: C (Norman Joseph Woodland and Bernard
modulated to a required frequency and then transmitted Silver)
92 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

Notes: Barcode is a method of representing data in a 104. Which of the following are the components of a
visual, machine-readable form. Initially, barcodes barcode symbol?
represented data by varying widths and spacings of a) Antenna
parallel lines. These barcodes are referred to as linear or b) Quiet Zone
one-dimensional (1D) that can be scanned by an optical c) Transponder
scanners, called barcode readers. Norman Joseph d) Start Character
Woodland and Bernard Silver invented the barcode
Library Info

Library Info
based on Morse code around 1949. However, the A. a, b, and d are correct
technology was patented in 1952. Later, a matrix code, B. a, c and d are correct
also termed as 2-Dimentional barcode (2D Code) were C. a and d are correct
devised which represent more data per unit area. One of D. b and d are correct
the examples of matrix code is QR Code.
Answer: D
101. The code comprises a series of bars and spaces
arranged according to a set of rules is known as Notes: A barcode symbol typically consists of
__. five parts: a quiet zone, a start character, data
A. Quick Response Code characters (including an optional check character), a
B. Barcode stop character, and another quiet zone.
C. Micro QR Code 105. Which type of Barcode is used in QR code?
D. Frame QR Code A. One dimensional
Answer: B (Barcode) B. Two dimensional
C. Three dimensional
Notes: A bar code is a series of vertical lines called D. None of the above
bars and spaces, both of varying width. Different
combinations of bars and spaces represent different Answer: B (Two dimensional)
characters. 106. QR Code stands for ___.
102. What is the name of the technology, the barcode A. Quick Registration Code
is generally uses? B. Quick Response Code
A. Radio waves C. Quality Readable Code
B. Laser D. Quick & Readymade Code
C. Infrared Waves Answer: B (Quick Response Code)
D. None of the above
Notes: Quick Response Code (QR Code) is a type
Answer: B (Laser)
of matrix barcode (or two-dimensional barcode) first
103. ___ identify specific items and are used to designed in 1994 by Masahiro Hara at Denso Wave in
charge, discharge, and renew items in the online Japan.
computer system.
107. What are the standardized encoding modes used
A. ISBN
in QR Code?
B. Barcode a) Numeric
C. ISDN b) Alphanumeric
D. ISSN
c) Byte/binary
Answer: B (Barcode) d) Kanji
A. a, b and d are correct
93 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

B. a, b and c are correct 111. SQRC stands for __.


C. b, c and d are correct A. Small Quick Response Code
D. a, b, c, and d are correct B. Single Quick Response Code
C. Secure Quick Response Code
Answer: D D. None of the above
Notes: The QR code system was invented in 1994 by Answer: C (Secure Quick Response Code)
Masahiro Hara for the Japanese company Denso
Library Info

Library Info
Wave. A QR code uses four standardized encoding Notes: SQRC is a type of QR Code equipped with
modes (numeric, alphanumeric, byte/binary, and kanji) reading restricting function. This can be used to store
to store data efficiently. private information and to manage company's internal
information.
108. A QR code is capable to store up to how many
characters in one symbol? 112. Which among the following are the features of
A. 7088 SQRC?
B. 7089 A. Locking up of encoded data
C. 7090 B. Composite of public and private data
D. 7091 C. Appearance and apparent properties of regular
QR Code retained
Answer: B (7089) D. All the above
Notes: The symbol versions of QR Code range from Answer: D (All the above)
Version 1 to Version 40. Each version has a different
module configuration or number of modules. (The 113. How many correction levels are available with
module refers to the black and white dots that make up QR Code?
QR Code). "Module configuration" refers to the number A. 3
of modules contained in a symbol, commencing with B. 4
Version 1 (21 × 21 modules) up to Version 40 (177 × C. 5
177 modules). Version 40 (177x177 modules) QR Code D. 6
is capable of storing up to 7,089 numeric characters.
Answer: B (4)
109. In structure of QR Code, each QR Code symbol
is constructed by __. Notes: There are 4 error correction levels used for QR
A. Circle codes, with each one adding different amounts of
B. Square “backup” data depending on how much damage the QR
C. Triangle code is expected to suffer in its intended environment.
D. Rectangle Level L (low) – up to 7% damage; Level M (Medium) –
up to 15% damage; Level Q (Quartile) – up to 25%
Answer: B (Square) damage; and Level H (High)– up to 30% damage.

110. A QR Code is readable from any direction in __. 114. Version 40 of QR code have which level of error
A. 180 degrees correction?
B. 360 degrees A. Level L
C. 90 degrees B. Level M
D. 270 degrees C. Level Q
D. Level H
Answer: B (360 degrees)

94 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

Answer: A (Level L) However, Micro QR code was standardized as JIS-X-


0510 in 2004 and has only one position detection
115. Version 40 QR code contains how many pattern.
modules?
A. 57x57 117. ISO/IEC 18004: 2000 is the international
B. 117x117 standard for developing __.
C. 117x177 A. QR code
D. 177x177 B. Biometric
Library Info

Library Info
C. MARC
Answer: D (177x177) D. Bibliographic record
Notes: The symbol versions of QR Code range from Answer: A (QR code)
Version 1 to Version 40. Each version has a different
module configuration or number of modules. (The 118. QR code symbol is surrounded by which zone on
module refers to the black and white dots that make up all four sides?
QR Code). "Module configuration" refers to the number A. Quiet zone
of modules contained in a symbol, commencing with B. Separators
Version 1 (21 × 21 modules) up to Version 40 (177 × C. Data zone
177 modules). Version 40 (177x177 modules) QR Code D. Finder
is capable of storing up to 7,089 numeric characters.
Answer: A (Quiet zone)
116. Position Detection pattern are arranged at __
corners of the QR code. 119. The encoded data stored in a QR code is known
A. 1 as __.
B. 2 A. Quite Zone
C. 3 B. Position Pattern
D. 4 C. Alignment Pattern
D. Data Zone
Answer: C (3)
Answer: D (Data Zone)
Notes: QR code (Quick response code) is a matrix 2D
code for high-speed reading developed by DENSO 120. Which pattern is used while capturing the QR
WAVE in 1994. It was registered to the ITS standard of code using a camera to correct the distortion
the AIMI in 1997 and to ISO/IEC standards in 2000. caused while taking the picture?
The smallest element (black or white square) of the QR A. Position Pattern
code is called “a module”. A QR code is composed of a B. Timing Pattern
combination of black and white modules, position C. Alignment Pattern
detection patterns, timing patterns, D. Finder Pattern
format information that contains error correction level Answer: C (Alignment Pattern)
and mask numbers, data area and error correction code
(Reed-Solomon code). The position detection patterns 121. Reed-Solomon Codes that are used for error
are arranged at three corners of the QR codes. The correcting in QR Codes were first introduced in
position of QR code is detected with the position ___.
detection patterns that allow high-speed reading. A. 1959
B. 1960
C. 1961

95 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

D. 1962 Blum, Nicholas Hopper and John Langford of Carnegie


Mellon University.
Answer: B (1960)
Search Engine/Discovery System
Notes: Reed–Solomon codes are a group of error-
correcting codes that were introduced by Irving S. 125. Who invented the concept of ‘Deep Web’?
Reed and Gustave Solomon in 1960. There are two A. Andy Grove
basic types of Reed–Solomon codes, original view B. John C. Flanagan
Library Info

Library Info
and BCH view. C. Michael Bergman
D. Larry Arvin
122. Who among the following is credited to invent
biometric technology? Answer: C (Michael Bergman)
A. Norman Joseph Woodland
B. Bernard Silver Notes: Deep web or hidden web or invisible web, in a
C. Sir William Herschel search context, was coined in the year 2001 by Michael
D. Denso Wave Bergman. He divided the World Wide Web into two
parts:
Answer: C (Sir William Herschel)
Surface web (Visible Web)- the part that traditional
Notes: Sir William Herschel is credited to first devise search engines indexes such as Google, Yahoo, Bing etc.
and used the fingerprint technology while working as a and Deep web (Hidden Web) - the part that is hidden
magistrate in Bengal (India) in around 1858. from the traditional search engines. The content of the
deep web can be located and accessed through a direct
123. The type of test used in computing to check
URL or IP address, but may require a password or other
whether or not the user is a human is __.
security access to get past public-website pages.
A. Debugging
Examples: Academic databases, Subscription based
B. Cryptanalysis
Information, Medical record, Legal documents etc.
C. CAPCHA
D. Black Box Testing Dark Web: Dark web is a subset of Deep web that is not
regulated and whose IP addresses are intentionally
Answer: C (CAPCHA)
hidden. It consists of websites that use public interest,
124. The term ‘CAPTCHA’ stands for __. but require specific software for access and is not
A. Completely Automated Public Token Test indexed by search engines to ensure anonymity. The
To Tell Computers and Humans Apart stolen data is traded, sold and used for financial, political
B. Completely Automated Public Turing Test or personal gain.
To Tell Computers and Humans Apart
126. Which web is the part of the World Wide Web
C. Completely Automated Public Testing for
(WWW) but the contents are not indexed?
Computers and Humans Alike
A. Surface Web
D. None of the above
B. Hidden Web
Answer: B (Completely Automated Public Turing C. Semantic Web
Test To Tell Computers and Humans Apart) D. None of the following

Notes: The term CAPTCHA (Completely Automated Answer: B (Hidden Web)


Public Turing Test To Tell Computers and Humans
127. ‘Google Earth’ is __.
Apart) was coined in 2000 by Luis von Ahn, Manuel
A. Web image
96 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

B. Search engine Notes: Searchbug is a United States based professional


C. Virtual globe online service to find and investigate people, businesses,
D. Webmap search addresses & phone numbers.

Answer: C (Virtual Globe) 131. Which of the following search engines is merged
with Science Direct?
Notes: Google Earth first released in 2001. A. CiteseerX
128. What is the difference between ‘Google’ and B. Alta Vista
Library Info

Library Info
‘Google Chrome’? C. Dogpile
D. Scirus
A. Google is a search engine whereas Google
Chrome is a web browser Answer: D (Scirus)
B. Google is a website whereas Google
Chrome is a search engine 132. Which search engine was exclusively meant for
C. Google is designed for use in table top searching scientific information?
computers whereas Google Chrome is A. Google
designed for mobile devices B. Alta-Vista
D. Google Chrome is an upgraded version of C. Dogpile
Google D. SCIRUS

Answer: A Answer: D (Scirus)

129. Google Search engine was developed in __. Notes: Scirus was a comprehensive science-specific
A. 1997 search engine, first launched in 2001. The search engine
B. 1996 which was owned and operated by Elsevier has no
C. 1998 longer been exists since February 2014.
D. 1999
133. Which of the following search engine was
Answer: A (1997) merged with Yahoo?
A. Dogpile
Notes: Google search engine was originally developed B. Scirus
as a research project by Larry Page, Sergey Brin, C. Alta-Vista
and Scott Hassan of Stanford University. It was first D. CiteseerX
launched in 2007. However the company Google Inc.
(Now Google LLC since 2017) was founded in Answer: C (Alta Vista)
September 1998 and headquartered in California, United
States. Notes: AltaVista was a Web search engine established
in 1995. It was purchased by Yahoo! in 2003, which
130. Which is NOT a search engine? retained the brand, but based all AltaVista searches on
A. Microsoft its own search engine. On July 8, 2013, the service was
B. AltaVista shut down by Yahoo!.
C. Google
D. Search Bug 134. Which of the following is metasearch engine?
A. Dogpile
Answer: A (Microsoft) B. Scirus
C. Alta-Vista
D. CiteseerX

97 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

Answer: A (Dogpile) Notes: Khoj is a search engine or online directory that


can search different types of data related to India. It is
Notes: Dogpile, created and developed in 1996 by offered by Sify Limited.
Aaron Flin, is a metasearch engine for information on
the World Wide Web that fetches results from Google, 139. Which is not a Meta Search engine?
Yahoo!, Yandex, Bing and results from other popular A. Dogpile
search engines. B. Mamma
C. Metacrawler
Library Info

Library Info
135. ‘Bing’ is a __. D. Alta vista
A. Web browser
B. Internet Browser Answer: D (Alta vista)
C. Metasearch Engine
D. Search Engine Notes: A meta search engine does not use crawler for
compiling their own searchable database. These search
Answer: D (Search Engine) engines utilise databases maintained by other individual
search engines. When a query is put before this type of
Notes: Bing, launched in 2009, is a web search engine search engine, it forwards that query to other search
owned and operated by Microsoft. engines. Examples of such search engines are: Dogpile,
Ask Jeeves, Inference Find, MetaCrawler, Profusion,
136. SurfWax and Dogpile are __.
A. Web Scale Discovery Services Surfwax, Mamma.
B. Semantic Search Tools and Databases 140. Arrange the following metasearch engines in
C. Meta-Search Engines ascending order of their year of launching:
D. General Search Engines a) Seerx
Answer: C (Meta-Search Engines) b) Skyscanner
c) Kayak
137. Baidu is a local search engine of __. d) Metacrawler
A. United States a. (a), (d), (c) and (b)
B. Singapur b. (c), (a), (d), and (b)
C. United Kingdom c. (c), (d), (b) and (a)
D. China d. (d), (b), (c) and (a)

Answer: D (China) Answer: D

Notes: Baidu founded in 2000 by Robin Li and Notes: A metasearch engine (or aggregator) is
headquartered in Beijing is the most popular search a search tool that uses another search engine's data to
engine in China. produce its own results from the Internet. The first
person to incorporate the idea of meta searching
138. Khoj is an online directory or search engine was Colorado State University's Daniel Dreilinger. He
sponsored by __. developed SearchSavvy that can search up to 20
A. Rediff India different search engines and directories at once. The
B. Indiatimes other meta search engines that followed are:
C. Sify Limited Metacrawler (Eric Selberg, 1995); Hotbot (1996);
D. None of the above Skyscanner (2001); Kayak (Steve Hafner, 2004);
CiteSeerX (2007).
Answer: C (Sify Limited)

98 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

141. Vivisimo – a meta search engine was founded A. Abstracting and Indexing Database
by ___. B. Bookmarking Network
A. Carnegie Mellon University C. Academic Social Network
B. Stanford University D. None of the above
C. University of California
D. Oxford University Answer: A (Abstracting and Indexing Database)

Answer: A (Carnegie Mellon University)


Library Info

Library Info
Notes: Google Scholar, first launched in November
142. Which of the following is a meta search engine? 2004 is a freely accessible web search engine that
A. Vivisimo indexes the full text or metadata of scholarly literature.
B. Google
146. Out of the following, which is a freely accessible
C. Yahoo
D. Bing web search engine that indexes the full text or
metadata of scholarly literature across an array of
Answer: A (Vivisimo) publishing formats?
A. Yahoo Scholar
Notes: Vivisimo, a metasearch engine was founded in B. JGate Scholar
2000 at Carnegie Mellon University. It is acquired by C. Google Scholar
IBM in 2012. D. All of these
143. Google Scholar was first launched in __.
A. 2004 Answer: C (Google Scholar)
B. 2005
C. 2006 147. What is the name of the service that usually
D. 2007 gathers metadata from different resources and
creates a unified index?
Answer: A (2004) A. Directory Service
B. Discovery Service
Notes: Google Scholar is a freely accessible web search
C. Reference Service
engine that indexes the full text or metadata of scholarly
D. None of the Above
literature across an array of publishing formats and
disciplines. It was first launched on 20th November Answer: B (Discovery Service)
2004.
148. VuFind is the tool used for ___.
144. Which of the following is a search engine? A. Library Automation
A. Internet Explorer B. Digital Library System
B. Mozilla Firefox C. Library Resource Discovery System
C. Google Chrome D. Institutional Repository
D. Google Scholar
Answer: C (Library Resource Discovery System)
Answer: D (Google Scholar)
149. Vufind is developed by __.
Notes: Google Scholar, first launched in November A. Oxford university
2004, is a freely accessible web search engine that B. Stanford University
indexes the full text or metadata of scholarly literature. C. University of Southampton
D. Villanova University
145. Google Scholar is the example of __.
99 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

Answer: D (Villanova University) Answer: B

Notes: VuFind is an open-source library search engine Notes: VuFind is an open-source library resource
that allows users to search and browse beyond the discovery system that allows users to search and browse
resources of a traditional Online public access catalog beyond the resources of a traditional Online public
(OPAC). VuFind was developed by Villanova access catalog (OPAC). VuFind was developed
University and was initially released in July 2010. by Villanova University and was initially released in
July 2010.
Library Info

Library Info
150. VuFind is written in __.
A. PHP Blacklight, an open source discovery tool developed by
B. Python University of Virginia in 2009.
C. Java
D. None of the above eXtensible Catalog developed by the University of
Rochester River Campus Libraries, is an open source
Answer: A (PHP) system to provide easy access to all library resources,
both digital and non-digital.
Notes: VuFind is written in PHP and uses MySQL
database in the backend for storing user comments, tags LibraryFind – LibraryFind is a discovery tool
and other information. developed by the Oregon State University Libraries,
United States, in part funded from a grant from the State
151. Which one of the following is NOT an open Library.
source discovery interface?
A. Blacklight 153. Villanova University is related to the
B. Vufind development of __.
C. eXtensible Catalog A. eXtensible Catalog
D. Orchid B. Blacklight
C. Vufind
Answer: D (Orchid) D. LibraryFind
Notes: Orchid Labs, founded in 2017, is a California- Answer: C (Vufind)
based software company that develops the open source
Orchid protocol, which is a peer-to-peer network and 154. Which of the following is NOT an example of
online marketplace for selling and buying internet web scale discovery service?
bandwidth. A. Primo – Ex Libris
B. Summon Serials Solutions
152. Select the correct combinations: C. EBSCO Discovery Service (EDS)
a) LibraryFind - Oregon State University D. DBpedia
Libraries
b) eXtensible Catalog – University of Answer: D (DBpedia)
Rochester River Campus Libraries
c) VuFind – Villanova University 155. The Cross Collection Discovery Service (CCDS)
d) Blacklight – University of Virginia refers to an improved ___ interface to submit
A. a and b are correct queries, receive results, and make content
B. a, b, c and d are correct selections.
C. b, c and d are correct A. Search
D. b and c are correct B. End-user
C. Discovery

100 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII

D. None of these a) Kohazon – Information mashup


b) VuFind – Library Discovery Service
Answer: B (End User) c) METS – Interoperability standard
156. Select the correct combinations” d) Z39.50 – Distributed cataloguing standard
a) BLUEcloud – Sirsidynix A. c, and d are correct
b) Intota – ProQuest B. a, and c are correct
c) Bibliovation - Progressive Technology C. b and c are correct
Library Info

Library Info
Federal Systems, Inc. (PTFS) D. a, b, c, and d are correct
d) WorldShare – OCLC Answer: D
A. c, and d are correct
B. a, and c are correct Notes: A mashup, by definition, is a web application
C. b and c are correct that uses and combines content (data, presentation or
D. a, b, c, and d are correct functionality) from more than one source to create a new
hybrid service. Information mashup tools allow
Answer: D remixing of data, technologies or services from
Notes: BLUEcloud Library Services Platform (LSP), different online sources to create new hybrid services
first released in June 2013 by SirsiDynix, is browser- through application programming interface (API).
based next generation software for libraries of all types Example: Kohazon – It is the integration of Koha
that allows cloud based administration, discovery, OPAC with Amazon services; Library Lookup –
acquisition and collection management applications. Integration of Google Map with library directory service
BLUEcloud campus is a unique collaboration in UK; Wikibios – a mashup where users can create
between SirsiDynix and EBSCO designed specifically online biographies of each other in a Wiki setup.
for academic and school libraries. Z39.50 – A distributed cataloguing protocol through
Intota – a product of Serials Solutions (a division of which we can search and fetch cataloguing record from
ProQuest) is a Library Services Platform (LSP) different databases.
designed to provide integrated suite of cloud-based 158. Which of the following is a platform to create
services. It was first released in June 2014. mashups?
Alma – Ex-Libris Alma, first released in July 2012, is a A. LiquidApps
unified library services platform which helps to manage B. Microsoft Popfly
print, electronic and digital materials in a single C. Yahoo Pipes
interface. Ex-Libris Alma is now acquired by D. All the above
ProQuest. Answer: D (All the above)
WorldShare Management Services – OCLC Notes: A mashup, by definition, is a web application
WorldShare Management Services is open, cloud-based that uses and combines content (data, presentation or
library services platform, first released in November functionality) from more than one source to create a new
2010. hybrid service. Information mashup tools allow
Bibliovation: a product of LibLime, PTFS (Progressive remixing of data, technologies or services from
Technology Federal Systems Inc.) is a cloud based different online sources to create new hybrid services
through application programming interface (API).
Library Services Platform.

157. Select the correct combinations: Thus, content used in mashups is typically sourced from
a third party via a public interface or API.
101 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

Example: Kohazon – It is the integration of Koha Answer: C (Bring Your Own Device)
OPAC with Amazon services; Library Lookup –
Integration of Google Map with library directory service Notes: Bring your own device (BYOD) refers to the
in UK; Wikibios – a mashup where users can create concept of employees bringing their own computing
online biographies of each other in a Wiki setup. devices to their workplace instead of or in addition to
company-supplied devices.
159. Which of the following valuable purpose can be
served by Makerspaces? 162. The various restrictions, like no full download,
Library Info

Library Info
A. Promoting creative problem solving no print, limited download in one session, etc
B. Offering experiential learning opportunities imposed by the publishers/aggregators, are termed
C. Facilitating prototype creation for as ___.
entrepreneurs and inventors A. Digital Rights Management (DRM)
D. All the above B. Content Rights Management (CRM)
C. E-book Rights Management (ERM)
Answer: D D. None of the above

Notes: Makerspace is a separate place for collaboration Answer: A (Digital Rights Management (DRM)
or collaborative work in library or work area for making,
learning, exploring, and sharing. It is a facility which Notes: Digital rights management (DRM) is a tool or
provides its users physical space and access to way to protect copyright for digital media. The purpose
resources and guidance in a flexible format that of DRM is to prevent unauthorized redistribution of
reciprocates to the interests and skill levels of users digital media and restrict the ways consumers can copy
seeking technical and implementational help on self- content they have purchased. DRM products were
directed projects. developed in response to the rapid increase in
online piracy of commercially marketed material, which
160. Who propounded the theory of disruptive proliferated through the widespread use of peer-to-
technologies in the year 2000? peer file exchange programs. Typically DRM is
A. John Fallon implemented by embedding code that prevents copying,
B. Elon Mask specifies a time period in which the content can be
C. Clayton Christensen accessed or limits the number of devices the media can
D. None of the above be installed on.

Answer: C (Clayton Christensen) 163. Select the correct combinations:


a) PaperBackSwap – Online book Trade club
Notes: The term disruptive technologies was coined by b) LibraryThing – Social cataloguing website
Clayton M. Christensen and introduced in his 1995 c) Technorati – blog search engine and
article Disruptive Technologies: Catching the Wave, co- directory
authored with Joseph Bower. A disruptive technology is d) Second Life – Online virtual world
an innovation that creates a new market and value A. c, and d are correct
network and eventually disrupts and displaced an B. a, and c are correct
existing market and value network. C. b and c are correct
161. What does BYOD stand for? D. a, b, c, and d are correct
A. Bring Your Optimum Device Answer: D
B. Bring Your Only Device
C. Bring Your Own Device Notes: PaperBackSwap (PBS) is a book swapping
D. None of the above website which was founded in 2004 by Richard
102 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

Pickering and Robert Swarthout. The purpose of 167. EZproxy is a product of ___.
PaperBackSwap is to use the Internet to facilitate the E. UTLAS
parity trading of books among members in F. OCLC
the United States using a credit based system for G. RLIN
swapping. The club also operates sister websites H. Library of Congress
SwapaDVD and SwapaCD to facilitate parity trading
of DVDs and CDs, respectively. Answer: B (OCLC)
Library Info

Library Info
Second Life is an online virtual world, developed and Notes: EZproxy is a web proxy server used by libraries
owned by the San Francisco-based firm Linden Lab and to give access from outside the library’s computer
launched on June 23, 2003. The platform principally network to restricted access websites that authenticate
features 3D-based user-generated content. users by IP address. It was initially released in 1999.

164. Which of the following is the test for assessing 168. Which of the following is not a remote access
online Information? tool to access subscribed content outside an
A. Internet Test organization network:
B. Research Test A. OpenAthens
C. Wiki Test B. Virtual Private Network(VPN)
D. CRAAP Test C. Ezproxy
D. Primo
Answer: D (CRAAP Test)
Answer: D (Primo)
Notes: CRAAP test is used to check the reliability of
online information sources across academic Notes: OpenAthens is a login identity and access
disciplines. CRAAP is an acronym for Currency, management service, supplied by Jisc (Joint
Relevance, Authority, Accuracy, and Purpose. The Information Systems Committee), a British not-for-
CRAAP test is developed by Sarah Blakeslee profit information technology services company founded
at California State University, USA in 2004. in 1993.

165. Which of the following is NOT an academic EZproxy is a web proxy server used by libraries to give
search engine and database? access from outside the library's computer network to
A. getCITED restricted-access websites that authenticate users by IP
B. HighWire Press address. The software was originally written by Chris
C. Spock Zagar in 1999 and later OCLC acquired it in 2008.
D. Intute Ex Libris Primo®, first released in 2006, provides a
Answer: C (Spoke) fast, comprehensive, and personalized discovery
solution similar to ProQuest Summon Discovery
166. IP authenticated access facilitates users to access Solution (First released in 2009). A single search
__. interface provides a gateway to a wealth of scholarly
A. Through login credentials content, including print, electronic and digital
B. Through suitable server path without login collections. Ex-Libris, founded in 1986, is an Israeli
C. Through different paths software (Jerusalem-based) company that provides
D. Through different places cloud-based library software solutions. It was acquired
by ProQuest in October 2015.
Answer: A (Through login credentials)
169. OpenAthens Project is developed in __.
103 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

A. UK data channel and a control channel. The control


B. USA channel verifies the connection between your device and
C. Greece the server, while the data channel transmits the data.
D. France These channels work together to ensure your data travels
securely. PPTP (Point to Point Tunneling Protocol),
Answer: A (UK) L2TP (Layer 2 Tunnel Protocol), OpenVPN, and
170. Which one is odd in group: IKEv2/IPSec are all Virtual Private Network protocols
Library Info

Library Info
A. OpenID used in order to establish a fast, secure, and reliable
B. Shibboleth connection between two nodes.
C. Ezproxy 173. The process/system by which an IP based
D. Vufind subscribed electronic resource can be accessed
Answer: D (Vufind) outside the IP range is known as:
A. Remote Access
Notes: Shibboleth, OpenID and Ezproxy are Remote B. Outside Access
Access Log-in tools while Vufind is a resource C. Online Access
discovery service to search across all e-resources of the D. Offline Access
library.
Answer: A (Remote Access)
171. Which of the following is a method for enabling
authentication based on the URL? 174. Which of the following is an example of
A. Shibboleth Federated search engine?
B. Kerberos A. Picaso
C. Digital Signature B. Knimbus
D. Referring URL C. KOHA
D. SOUL
Answer: D (Referring URL)
Answer: B (Knimbus)
Notes: Referring URL is a method for enabling
authentication based on the URL of the source which Notes: Knimbus, headquartered in New Delhi is a
provided the link. Referring URL authentication works dedicated knowledge discovery and collaborative space
by using the address of a secure page (URL) as for researchers and scholars. Knimbus, was founded in
authentication. 2010 by entrepreneurs Rahul Agarwalla and Tarun
Arora to address challenges faced by researchers in
172. PPTP and L2TP are __. searching across and accessing multiple information
A. Dynamic Host Configuration Protocol sources. Knimbus is India's leading eLibrary & Mobile
B. Tunneling Protocol App serving 500+ Universities and Colleges. Knimbus
C. Simple Mail Transfer Protocol eLibrary provides a customized eLibrary Portal &
D. Routing Information Protocol Mobile App which provides single point anywhere
access to all the digital resources of the institution.
Answer: B (Tunneling Protocol)
175. RemoteXs and EZProxy are examples of Library
Notes: A VPN or Virtual Private Network creates an __.
encrypted tunnel that guides data from your location to A. Online Public Access Catalogue
an alternate server. How your device communicates with B. Union Catalogue
the encrypted server is determined by the VPN tunneling C. Off-campus access mechanism
protocol. VPN protocols consist of two channels: a
104 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

D. Document Delivery Service C. Alan Harvey Guth


D. Georges Lemaitre
Answer: C (Off-campus access mechanism)
Answer: B (Herbert Van de Sompel)
Notes: Remote access is a technology to allow to library
user for accessing library subscribed resources anytime Notes: OpenURL is a NISO Standard (Z39.88 - 2004)
from anywhere without any disturbance. Some of the that provides a mechanism to describe a content item
major tools and technologies being used today for on a URL using standard metadata elements like
Library Info

Library Info
accessing e-content from outside library campus are: ISSN/ISBN, volume, issue, start page, DOI,
RemoteXs, EZproxy, VPN, Shibboleth, MyAthens, etc. An OpenURL is similar to a web address, but
OpenAthens, RemoteLog etc. instead of referring to a physical website, it refers to an
article, book, patent, or other resource within a website.
176. A service which is strictly personal and should In other words, it provides a mechanism for encoding
only be used for personal study and/or research citation for a resource as a URL. An OpenURL consists
purposes, namely: of baseURL + description. BaseURL provides location
A. Open Access of a ‘resolver’, while description is either a global
B. Remote Access identifier (i.e. DOI, ISBN) or a citation. It was created
C. Close Access by Herbert Van de Sompel, a librarian at
D. Professional Access the University of Ghent, in the late 1990s. The Online
Computer Library Center (OCLC) was named the
Answer: B (Remote Access)
maintenance agency for the standard on 22 June 2006.
177. Which of the following are access authentication
methods for digital collection? 179. OpenURL is a NISO Standard ___.
a) Shibboleth A. Z39.50
b) Open ID B. Z39.84
c) Open URL C. Z39.88
d) Counter D. Z39.90
A. c, and d are correct Answer: C (Z39.88)
B. a, and c are correct
C. b and c are correct 180. Which among the following are examples of
D. a, and b are correct Link Resolver applications?
a) WebBridge
Answer: D b) SFX
Notes: OpenID is an open standard and decentralized c) Both (a) and (b)
authentication protocol promoted by the non-profit d) None of the above
OpenID Foundation. Answer: C
Shibboleth is a single sign-on log-in system for Notes: Link Resolver is a software application that uses
computer networks and the Internet, managed by the OpenURL protocol to provide more seamless access
Shibboleth Consortium. The project started in 2000 to electronic full-text content across all databases and
and the first version was released in 2003. vendors for a desired citation. In other words, with the
help of Open URL protocol, it links the metadata
178. Who is the creator of OpenURL?
A. Tim Berners Lee (citation) available in one database to full-text available
B. Herbert Van de Sompel in other database for easy access. Examples: WebBridge
Link Resolver developed by Innovative Interfaces; SFX
105 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

Link Resolver developed by Ex Libris and 360 Link Answer: D (2015)


developed by Serials Solutions (ProQuest).
184. Which of the following is a cloud-based service
181. Select the correct combinations: model and provide secured access to scattered e-
a) Link Source – EBSCO Resources?
b) SFX – Ex Libris A. RemoteXs
c) WebBridge – Innovative Interfaces B. Shibboleth
d) Link Solver – Ovid C. EZproxy
Library Info

Library Info
A. c, and d are correct D. None of the above
B. a, and c are correct
C. b and c are correct Answer: A (RemoteXs)
D. a, b, c, and d are correct Notes: RemoteXs is a cloud-based service that provides
Answer: D a single portal for accessing a variety of e-content,
remote access authentication with one login for all
Notes: Commercially available link resolver content, the allocation of fixed IP addresses for
applications are: SFX Link Resolver – First institutions, and usage statistics for all e-resources.
commercially available link resolver application RemoteXs can be used on a variety of devices, including
developed by Ex Libris Group in 2000. Link Source - is tablets and smartphones. It is developed by Eclat
developed by EBSCO publishing and introduced in Engineering – a software company located in
2003. Link Solver - is developed by Ovid Technologies Ahmedabad, Gujarat.
in the year 2003. WebBridge - developed by Innovative
Interfaces and first released in 2002. 185. In the context of electronic resources,
COUNTER is associated with __.
182. Shibboleth is a free/open source software and A. Trial access activation
authorization tool that is based on __. B. Preservation
A. Hypertext Markup Language C. Usage statistics
B. Extensible Markup Language D. None of the above
C. Standard Generalized Markup Language
D. Security Assertion Markup Language Answer: C (Usage Statistics)

Answer: D (Security Assertion Markup Language) 186. Project COUNTER was launched in __.
A. 2001
Notes: Shibboleth is a single sign-on log-in system for B. 2003
computer networks and the Internet. It is based on based C. 2005
on Security Assertion Markup Language (SAML). D. 2006
Shibboleth is open-source and provided under the
Apache 2 license. Shibboleth 2.0 released in 2008 and Answer: B (2003)
builds on SAML 2.0 standards. Notes: COUNTER (Counting Online Usage of
183. In which year, version 3.0 of the Shibboleth Networked Electronic Resources) is an international
software was created? initiative designed to serve librarians, publishers and
A. 2000 intermediaries by facilitating the recording and exchange
B. 2005 of online usage statistics to an agreed set of international
C. 2008 standards and protocols. Project COUNTER, officially
D. 2015 launched in March 2002 is a non-profit organization
supported by a global community of library, publisher
106 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

and vendor members, who contribute to the development scanning physical paper records, generally done to
of the Code of Practice through working groups and digitized library materials. The term ‘born-digital’ was
outreach. COUNTER sets and maintains the standard first coined independently by Randel (Rafi) Metz in
known as the Code of Practice (COP) which is to be 1993.
used with the ANSI/NISO Z39.93-2014 protocol, called
SUSHI, to retrieve usage data quickly. The first release 189. A person born and raised in a digital world rich
of COUNTER Code of Practice for online journals and in technology is called __.
A. Born Digital
Library Info

Library Info
databases was happened in January 2003. Release 5 is
the current Code of Practice (COP5) and the B. Digital native
requirement for COUNTER compliance effective from C. Technology native
January of 2019. D. Information Gatekeeper

187. SUSHI protocol stands for ___. Answer: B (Digital native)


A. Standardized Usage Statistics Harvesting 190. Who coined the term ‘Digital native’?
Initiative
A. Evan Williams
B. Standardized Universal Statistics Harvesting
B. Rafi Metz
Initiative C. Marc Prensky
C. Standard Usage Statistics Harvesting D. David Wiley
Initiative
D. None of the above Answer: C (Marc Prensky)

Answer: A (Standardized Usage Statistics Harvesting Notes: Digital native is a term coined by Marc Prensky
Initiative) in 2001 to describe the generation of people who grew
up in the era of ubiquitous technology, including
Notes: SUSHI stands for Standardized Usage Statistics computers, internet, video games and social media.
Harvesting Initiative. It is a standard protocol
(ANSI/NISO Z39.93-2007) first accepted by NISO as 191. Digital obsolescence means __.
an Standard in 2007 and revised in 2014 that can be a) Obsolescence of hardware
used by electronic resource management (ERM) systems b) Obsolescence of software
and other systems to automate the delivery of
c) Obsolescence of technical skills
COUNTER usage statistics report in XML format.
d) Obsolescence of data
Digitization and Digital Library A. a and b are correct
B. a, b and d are correct
188. Who coined the term ‘Born-Digital’? C. c and d are correct
A. Evan Williams D. a, and c are correct
B. Rafi Metz
C. Vitek Tracz
Answer: B
D. David Wiley Notes: Digital obsolescence is a situation in which
digital resource cannot be read anymore, either
Answer: B (Rafi Metz) because physical medium that contains it is no
Notes: The term born digital refers to materials that
longer in use, or hardware or software which
originate in a digital form. While the opposite term executes it is not available, is known as the digital
‘Digital Reformatting’ refers to materials which is obsolescence
transformed from analog to digital form as in the case of

107 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII

192. A situation where a digital resource is no 195. The birth of virtual library happened at __.
longer readable is called: A. North America
A. Digital divide B. North Carolina
B. Digital Representation C. North India
C. Digital Rendering D. South Korea
D. Digital Obsolescence
Answer: B (North Carolina)
Answer: D (Digital Obsolescence)
Library Info

Library Info
Notes: The North Carolina Digital Heritage Center is
Notes: Digital obsolescence is a situation where a a statewide digitization and digital publishing
digital resource is no longer readable because of its program that works with cultural heritage institutions
of all sizes across North Carolina to digitize and
archaic (old) format: the physical media, the reader
publish historic materials online.
(required to read the media), the hardware, or the
software that runs on it is no longer available. 196. In a virtual library:
A. There is no corresponding physical
193. Which of the following are reasons for digital
collection
divide?
B. Collection is available online as well as
a) Mobile number portability
offline
b) Low internet penetration
C. Collection is available online as well as print
c) Non-availability of ICT infrastructure
form
d) Familiarity with information technologies
D. Collection is available on CD as well as
Print form
A. c, and d are correct
B. a, and c are correct Answer: A (There is no corresponding physical
C. b and c are correct collection)
D. b and d are correct
197. Virtual library is the output of __.
Answer: C A. Virtual reality
B. Computerization
Notes: Digital divide is the uneven distribution in the
C. Networking
access to, use of, or impact of ICTs between any number
D. Virtual efficiency
of distinct groups/community. In other words, digital
divide refers to the gap between those able to benefit Answer: A (Virtual reality)
from the digital age and those who are not.
Notes: Virtual Library refers to the scientifically
194. The term ‘Virtual Library’ was coined by __. managed collection of information resources and
A. Paul Zurkowski services on site as well as off site that are available in a
B. Michael Casey virtual reality environment and accessible
C. Tim Berners Lee electronically through the internet at any time from any
D. Mark Zuckerberg geographical location. Virtual Reality (VR) is an
illusive environment for the eyes, ears and other sense
Answer: C (Tim Berners Lee)
organs where user can experience the real world in an
Notes: The term ‘Virtual Library’ was first coined by artificially created environment by the computer system.
Tim Berners Lee, the creator of HTML and Internet, in It is a state of real sensational feeling in an imaginary
1991 at CERN in Geneva. environment. The environment is so perfectly created
and highly stimulated that one can experience just like a
108 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

real situation but with a full control over the B. a, b and c are correct
environment. The virtual library is the output of C. b, c and d are correct
virtual reality, an illusive environment for the eyes in D. a, b, c, and d are correct
which the user feels that as if he is moving inside the
library when he moves the mouse. When the user clicks Answer: D
the book on a shelf, then the book floats from the shelf
201. Which of the following steps are involved in the
and opens up before him. The user can turn pages, copy
selection of documents for digitization?
Library Info

Library Info
or make print the materials. a) Checking for copyright
198. A virtual library __. b) Checking the research significance of the
a) Presupposes a physical existence document
b) Collection of resources available on one or c) Checking for price
more computer systems with a single d) Checking the condition of document
interface or entry point to the collection A. a, b and d are correct
c) Does not provide access to entire content of B. a, b and c are correct
a (digital) library via internet C. b, c and d are correct
d) Provides user assistance services such as D. a, b, c, and d are correct
reference, inter library loan, etc. Answer: A

A. a, b, and c are correct 202. Which of the following are limitations of digital
B. b and d are correct libraries?
C. a, c, and d are correct a) Full text searching
D. a and b are correct b) Operational searching
c) Rights management
Answer: B d) Hyper text linking
199. Which is not applicable to the Digital library? A. a and b are correct
A. Digital library is a logical extension of the B. a, b and d are correct
traditional library C. c and d are correct
B. Digital library is a system that provides D. b, and c are correct
community of users with coherent access to Answer: D
a large repository of knowledge
C. Digital library is an organization that does 203. Digital library function incorporate:
not require the specialized staff a) Creating and capturing
D. Digital library is used by many at the same b) Storage and management
time c) Search and access
d) Abstracting and reviewing
Answer: C

200. Digitization of various cultural A. a and b are correct


resources is possible through: B. a, b and c are correct
a) Scanners C. c and d are correct
b) Digital cameras D. b, and c are correct
c) Video cameras Answer: B
d) Smart & Mobile Phones
A. a, b and d are correct 204. Citrix Virtual Apps and VMware are __.
109 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

A. Virtualization Software Notes: DAISY (Digital Accessible Information


B. Visualization Software System) is the emerging world standard for digital
C. Wireless Network talking books for people who are blind or have a print
D. Antivirus Software disability. It is a technical standard for
digital audiobooks, periodicals, and computerized text,
Answer: A (Virtualization Software) mainly based on the MP3 and XML formats. DAISY
Consortium was founded in 1995 and works as the
Notes: In computing, virtualization is the act of creating
Library Info

Library Info
a virtual (rather than actual) version of something, official maintenance agency for the DAISY/NISO
including virtual computer hardware platforms, in Standard. The most recent DAISY 3 (2005) version is
order to run multiple operating systems on a computer based on XML and is standardized
system simultaneously. VMware is a product of an as ANSI/NISO Z39.86-2005.
American virtualization technology company under Dell 208. Memex device was first devised by __.
Technologies headquartered in California. A. Vannevar Bush
205. The distinct characteristic(s) of digital objects B. John C. Flanagan
are: C. Mike Krieger
A. Physical Medium D. Andrew McCollum
B. Logical process Answer: A (Vannevar Bush)
C. Conceptual recognition
D. All the above Notes: The memex is the name of the hypothetical
proto-hypertext system that Vannevar Bush described
Answer: D (All the above) in his 1945 The Atlantic Monthly article "As We May
206. Who is the inventor of the e-book? Think". A memex is a device in which an individual
A. Jeff Bezos stores all his books, records, and communications, and
B. Andries Van Dam which is mechanized so that it may be consulted with
C. Alan Kay exceeding speed and flexibility.
D. Michael Stern Hart 209. MyLOFT stands for __.
Answer: D (Michael Stern Hart) A. My Library On Future Trends
B. My Library Offline Transactions
Notes: Michael Stern Hart was an American author, best C. My Library On Fingertips
known as the inventor of the e-book and the founder D. None of the above
of Project Gutenberg (PG), the first project to make e-
books freely available via the Internet. He published e- Answer: C (My Library On Fingertips)
books years before the Internet existed via Notes: Developed by Ahmedabad (Gujarat) based IT
the ARPANET. company Eclat Engineering, MyLOFT stands for 'My
207. DAISY Stands for __. Library On Fingertips'. It is an app for accessing,
A. Digital Accessible Information System for organizing and sharing digital content and e-
Youth resources subscribed by the library. It allows users to
B. Daily Information System download content and save for offline reading.
C. Digital Accessible Information System 210. ‘Ask the Librarian’ is an example of __.
D. None of these A. Internet Digital Library
Answer: C (Digital Accessible Information System) B. Virtual Library
C. Real Time Digital Library
110 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

D. None of the above 214. Kindle is the e-book reading device by _.


A. Amazon
Answer: C (Real Time Digital Library) B. Sony
Notes: Ask a Librarian is a live virtual C. Infibeam
reference service that offers online reference assistance D. Apple
to users. Answer: A (Amazon)
Library Info

Library Info
211. Jubilee Project is associated with __. Notes: Kindle is a series of e-readers designed and
A. Public library survey marketed by Amazon and was first launched in
B. Evaluation of electronic information November 2007.
services
C. Strategic management of libraries 215. Select the correct combinations:
D. Scale development a) Kindle – Amazon
b) Nook – Barnes & Noble
Answer: B (Evaluation of electronic information c) PI – Infibeam
services) d) Kobo – Kobo Inc.
A. c, and d are correct
Notes: JUBILEE (JISC User Behaviour in Information
B. a, and c are correct
seeking: Longitudinal Evaluation of Electronic
Information Services) is one of two large- C. b and c are correct
scale projects funded under the JISC's MEUB D. a, b, c, and d are correct
Framework and started in 1999. Answer: D
212. Project Gutenberg is associated with __. 216. Select the correct combinations:
A. E-Journals a) Twitter – Micro blogging
B. E-books b) PI – E-book
C. Bibliographic database c) X.25 – A type of protocol
D. Numeric database d) ISID – E-Bibliographic Database
Answer: B (E-Books) A. c, and d are correct
B. a, and c are correct
Notes: Project Gutenberg is the oldest digital library of C. b and c are correct
e-books. It was founded in 1971 by Michael S. Hart. D. a, b, c, and d are correct

213. ‘Pi’ is the e-book reading device by __. Answer: D


A. Amazon
B. Sony 217. Which format is not used by e-book reader?
C. Infibeam A. BRF
B. EPUB
D. Nokia
C. PDF
Answer: C (Infibeam) D. RTF

Notes: Infibeam, founded by Vishal Mehta in 2007, is Answer: A (BRF)


an online retailer for books, electronics, and automobiles
in India. In 2010, Infibeam launched ‘Pi’, India’s first e- Notes: Braille Ready Format (BRF) is ASCII text files
book reader. that represent finished braille pages.

111 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII

218. Arrange the following printing technologies Data to deliver a new library services platform to
according to their emergence: transform library technology. Index Data was
a) Movable type commissioned to perform the development of the core
b) Dot-Matrix printer infrastructure components of FOLIO beginning in late
c) Woodblock printing 2015. The Open Library Foundation is the
d) Screen printing administrative home of FOLIO Project.

221. PubMed Central (PMC) is a digital archive of


Library Info

Library Info
A. (d), (c), (b) and (a)
B. (c), (a), (d), and (b) __.
C. (c), (d), (b) and (a) A. Biomedical literature
D. (d), (a), (b) and (c) B. Social Science literature
C. Computer Science literature
Answer: B D. All the above

Notes: Woodblock Printer (220AD); Movable Type Answer: A (Biomedical literature)


(1040 AD); Screen Printer (1911); Dot-Matrix Printer
(1925) Notes: PubMed Central (PMC), started in 2000 by
United States National Library of Medicine (NLM) is
219. Which of the following web resource for LIS a free digital repository that archives open access full-
has been compiled by academic librarians of text scholarly articles that have been published within
universities of California? the biomedical and life sciences journal literature.
A. Infomine PubMed Central is very distinct from PubMed. PubMed
B. Internet Public Library Central (PMC) is a free digital archive of full articles,
C. Internet Library for Librarians accessible to anyone from anywhere via a web browser.
D. Current Informed Librarian On the other hand, PubMed is a free searchable database
of biomedical citations and abstracts, started in
Answer: A January 1996 and offered free to the public starting in
June 1997.
Notes: Selected and maintained by librarians from
several California universities, INFOMINE is a catalog 222. TKDL is developed and managed by __.
of over 100,000 scholarly web resources. The project A. National Library and RRRLF
started in 1994. B. CSIR and RRRLF
C. CSIR and AYUSH
220. FOLIO Open Library Project is a collaborative
efforts of __. D. AYUSH and National Library
A. Open Library Foundation (OLF) Answer: C (CSIR and AYUSH)
B. Index Data
C. EBSCO Notes: The Traditional Knowledge Digital Library
D. All the above (TKDL) setup in 2001, is a digital knowledge repository
of the traditional knowledge, especially about medicinal
Answer: D plants and formulations used in Indian systems of
Notes: FOLIO is an open, extensible library services medicine.
platform, aims to reimagine library software through a 223. 'Kalasampada Digital Library' is associated with
unique collaboration of libraries, developers and __.
vendors. FOLIO (folio.org) is a creative collaboration A. DESIDOC
between OLF, EBSCO Information Services, and Index B. NDCMC
112 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

C. IGNCA Notes: Chitraksharika ia an Optical Character


D. NISCAIR Recognition for Devanagari Script developed by C-
DAC, Noida.
Answer: C (IGNCA)
227. ‘NALANDA’ is the digital library initiative of
Notes: Kalāsampadā Digital Library- Resource for __.
Indian Cultural Heritage (DL-RICH) project was A. DRTC
developed by IGNCA and sponsored by the Department B. National Library of India
Library Info

Library Info
of Information Technology, Ministry of Communication C. NIT, Calicut
and Information Technology (MCIT), Government of D. NISCAIR
India.
Answer: C (NIT, Calicut)
224. Muktabodha, an Indian digital library deals with:
A. Anthropology Notes: Nalanda Digital Library is part of National
B. Archeology Institute of Technology, Calicut Library and offers free
C. Indology eBooks in PDF and HTML formats in Engineering,
D. Sociology Classic Fiction, History, Biography, Psychology,
Philosophy, Homeopathy etc.
Answer: C (Indology)
228. Digital library initiative ‘ Granth Sanjeevani’ is
Notes: The Muktabodha Indological Research announced by:
Institute (MIRI), New Delhi, is dedicated to preserving A. RRRLF
the philosophical and scriptural texts of classical India. It B. The Asiatic Society of Mumbai
uses digital technology to preserve and protect these C. Connemara Public Library, Chennai
texts, and make them accessible to scholars and seekers D. National Library of India, Kolkata
worldwide. Muktabodha was inaugurated in 1997 by
Gurumayi Chidvilasananda, spiritual head of the Answer: B (The Asiatic Society of Mumbai)
Siddha Yoga path.
Notes: Asiatic Society of Mumbai launched its digital
225. ‘Dware-Dware Gyan Sampada’ is a ____. library initiative Granth Sanjeevani on 15 January 2018.
A. Public Library Initiative
B. Digital Library Initiative 229. ‘Librarian’s Digital Library (LDL)’ is the
C. UNESCO Initiative initiative of __.
D. Institutional Repository A. DRTC
B. National Library of India
Answer: B (Digital Library Initiatives) C. IGNCA
D. NISCAIR
Notes: Dware Dware Gyan Sampada is a mobile digital
library initiative of C-DAC, Noida. Answer: A (DRTC)

226. Chitraksharika is a ___. Notes: Librarian’s Digital Library (LDL) has been
A. An optical character recognition tool developed by DRTC, which contains full text of
B. An image software papers/articles related to Indian Librarianship.
C. An e-book reader Presently it contains full text papers submitted in
D. None of the above DRTC seminars, papers submitted by LIS
professionals and Students Theses/Dissertations.
Answer: A (An optical character recognition tool)

113 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII

230. National Digital Library of India is being B. a, c and d are correct


developed by: C. b, and d are correct
A. IIT Delhi D. b and c are correct
B. IIT Roorkee
C. IIT Bombay Answer: C
D. IIT Kharagpur 234. ‘Tibetan and Himalayan Digital Library’ is
Answer: D (IIT Kharagpur) hosted by ___.
Library Info

Library Info
A. Stanford University
231. National Digital Library of India is part of the B. University of North Bengal
online services of the ___. C. University of Delhi
A. Indian Institute of Technology, Delhi D. University of Virginia
B. Indian Institute of Technology, Kharagpur
C. Indian Institute of Technology, Roorkee Answer: D (University of Virginia)
D. Indian Institute of Technology, Kanpur
Notes: The Tibetan and Himalayan Library (THL),
Answer: B (Indian Institute of Technology, formerly the Tibetan and Himalayan Digital
Kharagpur) Library (THDL), is a multimedia guide and digital
library developed in 2000 by the University of
Notes: Ministry of Human Resource Development Virginia focused on the languages, history and
(MHRD) under its National Mission on Education geography of Tibet and the Himalayas.
through Information and Communication Technology
(NMEICT) has initiated the National Digital Library of 235. World Digital Library (WDL) was launched in
India (NDL India) pilot project at Indian Institute of the year __.
Technology, Kharagpur in May 2016. The Library A. 2007
was dedicated to the nation on June 19, 2018, by union B. 2009
human resource minister Prakash Javadekar. C. 2011
D. 2012
232. A University providing Open Access to
Sanskrit dissertations through Internet: Answer: B (2009)
A. Jawaharlal Nehru University
Notes: Launched in 2009, the World Digital Library
B. Delhi University
(WDL) was a project of the U.S. Library of Congress,
C. University of Calcutta
with the support of UNESCO. The WDL repository
D. University of Madras
sought to preserve and share some of the world’s most
Answer: B (Delhi University) important cultural objects, increasing access to cultural
treasures and significant historical documents to enable
233. Identify from the following, the digital discovery, scholarship, and use.
library projects were implemented by C-DAC
236. Trove is a national digital library of __.
(Agency) Noida :
A. Spain
a) Creation of Vidwan database
b) Print your own book – Mobile Digital B. Australia
Library C. United Kingdom
c) Creation of Shodhsindhu D. France
d) Creation of Digital Library of Books in
Answer: B (Australia)
President House
A. a and b are correct
114 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

Notes: Trove is an Australian online library database 239. Arrange the following e-book sites in reverse
aggregator and service which includes full text chronological order of their origin:
documents, digital images, bibliographic and holdings a) Google Books
b) Hathi Trust Digital Library
data of items which are not available digitally, and a
c) Internet Archive
free faceted-search engine as a discovery tool. The d) Open Library
database is hosted by the National Library of Australia
and first launched in 2009. A. (b), (a), (c) and (d)
Library Info

Library Info
B. (c), (a), (d), and (b)
237. JSTOR is an online system for archiving and
C. (c), (d), (b) and (a)
accessing academic journals. It is located in __.
D. (d), (a), (b) and (c)
A. Germany
B. UK Answer: B
C. USA
D. Budapest Notes: Internet Archive (1996); Google Books (2004);
Open Library (2006); Hathi Trust Digital Library (2008)
Answer: C (USA)
240. Hathi Trust Digital Library is founded in __.
Notes: JSTOR (Journal Storage) is a digital A. 2007
library founded in 1995 by William G. Bowen in New B. 2008
York, United States, and funded by Andrew W. Mellon C. 2009
Foundation. Originally containing digitized back D. 2010
issues of academic journals, it now also includes books
and other primary sources, and current issues of journals. Answer: B (2008)
In 2009, JSTOR merged with and became a service
Notes: HathiTrust was founded in October 2008 by the
of ITHAKA, a not-for-profit organization that works to
thirteen universities of the Committee on Institutional
advance and preserve knowledge and to improve
Cooperation and the University of California.
teaching and learning through the use of digital
technologies. 241. An example of open access content source is __.
A. iZito
238. ‘Million Books on Web’ project was initiated
B. Zotero
by:
C. DSpace
A. MIT, USA
D. HathiTrust
B. Pittsburg University
C. Carnegie Mellon University Answer: D (HathiTrust)
D. Michigan University
242. Webnet is a __.
Answer: C (Carnegie Mellon University) A. Institutional repository program
B. Web-hosting service provider
Notes: The Million Book Project was a book
C. Digital library
digitization project led by Carnegie Mellon
D. None of the above
University from 2007–2008. Working with government
and research partners in India and China, the project Answer: B (Web-hosting service provider)
scanned books in many languages, using OCR to enable
full text searching, and providing free-to-read access to Notes: Webnet is a Canadian website development and
the books on the web. hosting company having branches in various countries
including India.

115 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII

243. arXiv is a ___. 246. ‘Archive-It’ is a subscription based web


A. Repository of electronic preprints of scientific archiving service of ___.
papers A. Internet Archive
B. Instant messaging service B. OCLC
C. File extension C. RLG
D. Video hosting service D. SLA

Answer: A Answer: A (Internet Archive)


Library Info

Library Info
Notes: ArXiv is a repository of electronic preprints of Notes: First deployed in 2006, Archive-It is a
scientific papers approved for posting after moderation, subscription based web archiving service from the
but not full peer review. It consists of scientific papers in Internet Archive that helps organizations to harvest,
the fields of mathematics, physics, astronomy and other build, and preserve collections of digital content.
subjects. The project started in 1991 by Paul Ginsparg
and hosted at Cornell University. 247. Classic Software Preservation Project (CLASP)
was set up by ___.
244. Which digital project is intended to ‘one web A. British Library
page for every book ever published’? B. National Library of Medicine
A. Open Library C. Internet Archive
B. Internet Archive D. IBM
C. Hathi Trust Digital Library
D. None of the above Answer: C (Internet Archive)

Answer: A (Open Library) Notes: The Classic Software Preservation Project


(CLASP) was set up in 2004 by the non-profit Internet
Notes: Open Library launched in 2006 by Internet Archive to assist in the permanent archiving of retail
Archive, is an online project of digital library index, software dating from the late 1970s to the early 1990s.
intended to create "one web page for every book ever
published". 248. The word ‘Podcasting’ is derived from __.
A. Broadcasting and iPod
245. Who among the following is the founder of B. Broadcasting and iPad
Internet Archive – a non-profit digital library? C. Vodcasting and iPod
A. Chester Carlson D. None of the above
B. Brewster Kahle
C. Michael S. Hart Answer: A (Broadcasting and iPod)
D. Edward Fox 249. The term ‘Podcast’ was first suggested by __.
Answer: B (Brewster Kahle) A. Ben Hammersley
B. Brewster Kahle
Notes: Brewster Kahle, an American Computer C. Edward Fox
Engineer founded the Internet Archive – a non-profit D. Michael S. Hart
digital library in the year 1996 and headquartered in
California. He also founded the Alexa Internet – a web Answer: A (Ben Hammersley)
traffic analysis and crawling company based in Notes: A podcast is an episodic series of
California. digital audio files that a user can download to a personal
device for easy listening. In other words, A podcast is a
digital recording of music, news or other media that is
116 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

accessible and can be downloaded from the internet to a A. a, and c are correct
portable media player. Podcasts are similar to radio B. b and d are correct
programs but unlike radio programs, they are in the form C. c, and d are correct
of audio files. These are made accessible by a podcast D. a b, c, and b are correct
distributor in a series of audio files on a server as a web
feed. The term ‘Podcast’, a combination of ‘ipod’ and Answer: D
‘broadcast’ was first suggested by Ben Hammersley in 254. Which among the following is free audio book
Library Info

Library Info
2004. site?
A. Ebrary
250. ‘Podcast’ means __. B. Virtua
A. Blog post containing audio files C. Librivox
B. Blog post containing video files D. Google Books
C. Blog post containing audio and video files
D. Blog post containing image files Answer: C (LibriVox)
Notes: LibriVox is USA based free audiobook site
Answer: A (Blog post containing audio files)
established in 2005 by a group of worldwide volunteers
who read and record public domain texts creating free
251. The term ‘Vodcast’ comes from the combination
public domain audiobooks for download from their
of __. website.
A. Video and Broadcast
B. IPod and Broadcast
C. Video and Podcast 255. Which is/are not true about NDLTD?
D. Ipad and Podcast a) It is a Digital Library of Thesis and
Dissertations.
Answer: C (Video and Podcast) b) It supports federated search facility
c) It also provide a browsing interface
252. The easiest way to bring Internet video to one’s separately
desktop or download is known as __. d) Browsing interface contain Index and
A. Flogging Abstracts only
B. Podcasting
C. Vodcasting A. a, and d are correct
D. Blogging B. b and c are correct
Answer: C (Vodcasting) C. b, c and d are correct
D. d only
Notes: A vodcast is a podcast that contains video
content, instead of solely audio. The term vodcast comes Answer: D
from the combination of the words "video" and Notes: The Networked Digital Library of Theses and
"podcast". Dissertations (NDLTD) established in 1996, is a
253. Which statements are true about Podcasting? collaborative effort of universities around the world to
a) An audio file on the internet promote creating, archiving, distributing and accessing
b) Accessed on a personal computer or portal Electronic Theses and Dissertations (ETDs). Since 1998,
MP3 Player an annual symposium on ETD is being organized. The
c) Can be released episodically 22nd ETD 2019 symposium will be held in Porto,
d) Users can receive notification of new Portugal, 6-8 November, 2019 with the theme ‘Fruits of
episodes via subscriptions to RSS feeds. Knowledge’.

117 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII

256. Which of the following sets are exclusive present. It is produced by ProQuest and was formerly
examples of union catalogue of ETD database? known as ProQuest Digital Dissertations.
a) NDLTD and IndCat
b) NDLTD and Vidyanidhi 259. Two major characteristics of open source
c) Shodhganga and WorldCat software licenses are:
d) Shodhganga and OATD A. Free copyright & Free distribution
A. a and b are correct B. Open and no IPR
C. Free distribution and open source code
Library Info

Library Info
B. b and d are correct
C. b, c and d are correct D. Free license and no IPR
D. b and c are correct Answer: C (Free distribution and open source code)
Answer: B Notes: Open source software are licensed for free
Notes: Vidyanidhi (Meaning 'Treasure of Knowledge' in distribution and its source code is openly available for
Sanskrit) is a digital library initiative to facilitate the modification.
creation, archiving and accessing of doctoral theses. 260. Which digital library software was launched as
Developed and maintained at University of Mysore, an experimental version for Android?
Mysore since 2000 with the initial support of NISSAT. A. DSPACE
OATD – Open Access Theses and Dissertations by B. Greenstone
OATD.org C. E-Print
D. Fedora
257. Who among the following is related to NDLTD?
E. Chester Carlson Answer: B (Greenstone)
F. Brewster Kahle 261. Which of the following is a digital library
G. Michael S. Hart software used to create an in-house digital library?
H. Edward Fox
A. LibSys
Answer: D (Edward Fox) B. Greenstone
C. Alice for Windows
Notes: Edward Fox serves as Executive Director and D. SOUL
Chairman of the Board for NDLTD.
Answer: B (Greenstone)
258. Which is NOT an electronic theses and
dissertations database? Notes: Greenstone is a suite of software tools for
A. OATD building and distributing digital library collections on
B. PQDT the Internet or CD-ROM. It is open-source, multilingual
C. NBER software, issued under the terms of the GNU General
D. NDLTD Public License. Greenstone is produced by the New
Zealand Digital Library Project at the University of
Answer: C (NBER) Waikato and distributed in cooperation with UNESCO
and the Human Info NGO.
Notes: ProQuest Dissertations and Theses (PQDT) is
an online database that indexes, abstracts, and provides 262. Green Stone-3, multilingual, multiplatform and
full-text access to dissertations and theses. The database highly configurable digital software is written in:
includes over 2.4 million records and covers 1637 to the A. JAVA
B. C++
C. COBOL
118 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

D. BASIC came into existence after merging DSpace Foundation


and Fedora Commons in 2009.
Answer: A (JAVA)
266. What is the purpose of handles in DSpace?
263. AJAX stands for __. A. A unique identifier of an item
A. Asynchronous JavaScript and XML B. A unique identifier of a bitstream
B. Asychronous JavaScript and Xquery C. A unique identifier of a metadata
C. Synchronous Java and XML D. None of the above
Library Info

Library Info
D. Asynchronous Jgate and XML
Answer: A (A Unique identifier of an item)
Answer: A (Asynchronous JavaScript and XML)
Notes: DSpace uses Handles primarily as a means of
Notes: AJAX stands for Asynchronous JavaScript assigning globally unique identifiers to objects. Each site
and XML. AJAX is a new web development technique running DSpace needs to obtain a unique Handle 'prefix'
for creating better, faster, and more interactive web from CNRI. Presently, Handles are assigned to
applications with the help of XML, HTML, CSS, and communities, collections, and items. Bundles and
Java Script. bitstreams are not assigned Handles.
264. Which one of these metadata sets is NOT 267. In relation to DSpace, the full form of SWORD
predefined in GSDL? is __.
A. Dublin Core A. Smart Web Open Repository Deposit
B. PREMIS B. Simple Web Open Repository Deposit
C. RFC 1807 C. Synchronous Web Open Repository Deposit
D. NZGLS D. Simple Web Offering Repository Deposit
Answer: B (PREMIS) Answer: D (Simple Web Offering Repository Deposit)
Notes: GSDL allows several predefined Metadata Sets Notes: SWORD (Simple Web-service Offering
such as: Dublin Core, RFC 1807, NZGLS (New Zealand Repository Deposit) created in 2007, is
Government Locator Service), AGLS (Australian an interoperability standard that allows digital
Government Locator Service). All metadata are stored in repositories to accept the deposit of content from
XML format with the documents. multiple sources in different formats. In short, SWORD
is a protocol that allows the remote deposit of items into
265. ‘Communities’ is a component of following
repositories.
digital library software:
A. GSDL 268. Which of the following database programs is
B. DSpace used in DSpace?
C. Fedora A. PostgreSQL
D. I-Core B. MSSQL
C. MySQL
Answer: B (Dspace)
D. None of the above
Notes: DSpace, written in Java, is open source
Answer: A (PostgreSQL)
repository software, first released in November 2002, as
a joint effort between developers from MIT and HP labs. 269. By default, DSpace uses __.
Presently DSpace project is being maintained and A. Dublin Core
developed by DuraSpace – a non profit organization B. Qualified Dublin Core

119 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII

C. Modified QDC 273. Duraspace provides cloud-based services related


D. MARCXML to __.
a) D-Space
Answer: B (Qualified Dublin Core) b) E-Prints
Notes: By default, DSpace uses a Qualified Dublin c) NewGen Lib
d) FEDORA
Core (QDC) based metadata schema. DSpace can
A. a, and d are correct
import or export metadata from other major metadata
Library Info

Library Info
schemas such as MARC or MODS. B. c and d are correct
C. b, and c are correct
270. DSpace is basically an open source software D. b and d are correct
available under __.
A. GNU/GPL distribution license Answer: A
B. New York software distribution license 274. Select the correct combinations:
C. Berkeley software distribution license a) Ex Libris – Alma
D. MIT software distribution license b) Polaris – Innovative Interfaces Inc.
Answer: C (Berkeley Software Distribution (BSD) c) Koha – Liblime
License) d) DSpace – Duracloud
A. c, and d are correct
271. Which of the following format is not supported B. a, and c are correct
in DSpace? C. b and c are correct
A. .dvi D. a, b, c, and d are correct
B. .tex
Answer: D
C. .djvu
D. .fm Notes: Ex-Libris Alma, released in 2012, is a cloud-
based library software services platform (SaaS) that
Answer: C (.djvu)
provides libraries most cost-effect library management
272. Which among the following digital library solutions. It is now owned by ProQuest.
software was developed at Cornell University?
275. Select the correct combinations:
A. FEDORA
a) FEDORA – Cornell University
B. E-Prints
C. D-Space b) GSDL - University of Waikato
D. GreenStone c) E-Prints - University of Southampton
d) DSpace - Massachusetts Institute of
Answer: A (FEDORA) Technology
A. c, and d are correct
Notes: FEDORA (Flexible Extensible Digital Object B. a, and c are correct
Repository Architecture) Repository open source C. b and c are correct
software was originally designed and developed by D. a, b, c, and d are correct
researchers at Cornell University and the first version
was released in May 2003. FEDORA project is now Answer: D
being supported by the DuraSpace not-for-profit
276. Select the correct combinations:
organization since its inception in 2009 after merging
DSpace Foundation and Fedora Commons. a) GSDL – 1996
b) E-prints – 2000
c) DSpace – 2002
120 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

d) FEDORA – 2003 messages between and among computer-


A. c, and d are correct based applications to enable them to perform functions
B. a, and c are correct necessary to lend and borrow items, to provide
C. b and c are correct controlled access to electronic resources, and to facilitate
D. a, b, c, and d are correct cooperative management of these functions. First
released in May 2001 and approved as standards
Answer: D ANSI/NISO Z39.83 on October 17, 2002
Library Info

Library Info
277. Which among the following institutions are 280. METS digital content standard is developed by
related with the development of E-prints digital __.
repository software? A. Library of Congress
A. MIT Library B. OCLC
B. Stanford University C. British Library
C. University of Waikato D. ISO
D. University of Southampton
Answer: A (Library of Congress)
Answer: D (University of Southampton)
Notes: METS (Metadata Encoding and Transmission
Notes: EPrints is free and open-source software for Standard) is a Library of Congress standard used to
building open access of scientific journals. EPrints has describe digital objects. This includes bibliographic,
been developed at the University of Southampton administrative and structural information about the
School of Electronics and Computer Science in 2000 and digitized material, as well as a list of files. It is expressed
released under a GPL license. using the XML schema language of the World Wide
Web Consortium (W3C). The standard is maintained as
278. EDI refers to __.
A. Electronic Data Interchange part of the MARC standards of the Library of Congress,
B. Essential Data Interchange and is being developed as an initiative of the Digital
C. Economic Data Interpretation Library Federation (DLF).
D. Educational Data Interchange 281. ‘MODS’ in the context of digital standard stands
Answer: A (Electronic Data Interchange) for __.
A. Metadata Object Description Schema
Notes: Electronic Data Interchange (EDI) is B. Multiple Object Digital Schema
the electronic interchange of business information using C. Metadata Object Digital Schema
a standardized format; a process which allows one D. Multiple Object Description Schema
company to send information to another company
electronically rather than with paper. Answer: A (Metadata Object Description Schema)

279. NCIP Stands for __. Notes: Metadata Object Description Schema (MODS)
A. NISO Communication Interchange Protocol is a schema for a bibliographic element set that may be
B. NISO Circulation Interchange Protocol used for a variety of purposes, and particularly for
library applications. The standard is maintained by the
C. NISO Circuit Interchange Protocol
D. NISO Cellular Interchange Protocol Library of Congress.

Answer: B (NISO Circulation Interchange Protocol) 282. ‘ALTO’ Digital Library Standard is developed
by __.
Notes: NISO Circulation Interchange A. OCLC
Protocol (NCIP) is a protocol that is used to exchange B. Library of Congress
121 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

C. ISI
D. ISO Notes: Raymond Kurzweil is involved in fields such
as optical character recognition (OCR), text-to-speech
Answer: B (Library of Congress) synthesis, speech recognition technology, and electronic
keyboard instruments. In 1974, Kurzweil founded
Notes: ALTO (Analyzed Layout and Text Object) is a
Kurzweil Computer Products, Inc. and led development
standardized a XML Schema that is used to store
of the first omni-font optical character recognition
technical metadata for describing the layout and content
system, a computer program capable of recognizing text
Library Info

Library Info
of physical text resources, such as pages of a book or a
written in any normal font.
newspaper. It is designed to be used as an extension
schema for use with the Library of 285. Kurzweil Data Entry Machine (KDEM) is
Congress' Metadata Encoding and Transmission meant:
Schema (METS) XML Schema, where METS provides A. to produce texts for visually impaired
metadata and structural information while ALTO B. to design digital project for all
contains content and physical information. C. to retrieve information for all.
D. to design information product for all
283. Which is the metadata schema for
educational/instructional object? Answer: A (to produce texts for visually impaired)
A. GEM
B. LOM Notes: Raymond Kurzweil invented the Kurzweil Data
C. IMS Entry Machine (KDEM) in 1977. It is an OCR machine
D. All the above that works as an input device to produce texts for the
blinds.
Answer: D (All the above)

Notes: Currently several widely implemented e-learning Digital Preservation


metadata standards exist including IEEE Learning
286. Long term digital preservation policy ensures
Object Metadata (IEEE-LOM), SCORM, IMS, and
__.
GEM.
A. Future proofing
The Gateway to Educational Materials (GEM) B. Backup mechanism
Metadata element set is a project funded by US C. Export and Import
Department of Education. It started as an effort to D. None of the above
facilitate access to online learning objects.
Answer: A (Future Proofing)
IEEE 1484.12.1-2002 Standard for Learning Object
Notes: Future-proofing is the process of anticipating the
Metadata (LOM) is a data model, usually encoded in
future and developing methods of minimizing the effects
XML, used to describe a learning object and similar
of shocks and stresses of future events.
digital resources used to support learning.
287. National Digital Preservation Program is
284. Ray Kurzweil, an American inventor is related
to: sponsored by __.
A. Computer Programming language A. Indian Institute of Technology (Kharagpur)
B. URL B. Ministry of Electronic and Information
C. OCR Technology, GOI
D. None of the above C. Ministry of Culture, GOI
D. National Library of India
Answer: C (OCR)
122 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

Answer: B (Ministry of Electronic and Information D. EBSCO


Technology, GOI)
Answer: C (ITHAKA)
Notes: National Digital Preservation Programme
(NDPP) is a project of Ministry of Electronics & Notes: PORTICO digital preservation service, started
Information Technology, Government of India. This in 2002 as project by JSTOR and launched in 2005, is
project is being implemented through Human-Centred now a part of ITHAKA, a not-for-profit organization
Design & Computing Group, C-DAC Pune, India. helping the academic community use digital
Library Info

Library Info
technologies to preserve the scholarly content (journals,
288. LOCKSS (Program), an international e-books, digitized collections) accessible to researchers,
community initiative by ___. scholars, and students in the future. Portico and
A. MIT Library CLOCKSS are dark archive, preserving digital content
B. Stanford University for the long term. Access to CLOCKSS content is
C. University of Waikato similar to the Portico model. The difference between
D. University of Southampton Portico and CLOCKSS is that Portico archives digital
content in Standard format, whereas CLOCKSS
Answer: B (Stanford University) preserves content in the publisher's original format (not a
Notes: LOCKSS (Lots of Copies Keep Stuff Safe) standard archival format). Portico is a proprietary
software and has centralized, hosted platform, while
program, founded in 1999 by Dr. David S.H. Rosenthal
CLOCKSS is an open source software and has
and Victoria Reich under the auspices of Stanford
University, develops and supports open source software distributed, peer to peer platform with error detection.
for digital preservation. LOCKSS is a real time backup 291. KB e-Depot is a digital information preservation
solution. It provides access to stored content whenever system of ___.
publisher sites are unavailable, even for a brief period of A. France
downtime. B. England
C. Netherlands
289. CLOCKSS program is related to ____.
D. Australia
A. Computer virus
B. Institutional repository Answer: C (Netherlands)
C. Long term digital preservation
D. Programming language Notes: Koninklijke Bibliotheek (KB), National Library
of the Netherlands launched a project of digital
Answer: C (Long term digital preservation) Information Archiving System ‘e-Depot’ in 2003 for
Notes: CLOCKSS (Controlled LOCKSS), founded as long term preservation of digital publications in the
a project in 2006, is a collaboration of world’s leading country.
academic publishers and research libraries, providing 292. Select the correct combinations:
sustainable dark archive to ensure the long term a) Portico – Preserves scholarly publications in
survival of web-based scholarly content. Digital content dark archives
is stored in the CLOCKSS archive with no user access b) Lockss – Non-profit service that allows
unless a “trigger” event occurs. libraries to collect e-contents for digital
290. Portico digital preservation service is part of __. preservation
A. Elsevier c) Clockss – Non-profit digital preservation
B. McGraw-Hill service for participating libraries
C. ITHAKA
123 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

d) Chorus – Clearinghouse for open resources Notes: DORIA (Digital Object Management System)
of the U.S. is a project set up by Helsinki University Library to
A. c, and d are correct preserve and manage digital collections of Finnish
B. a, and c are correct Universities and Polytechnics. Helsinki University
C. b and c are correct Library is also the National Library of Finland.
D. a, b, c, and d are correct
296. Arrange the following archives in a
Answer: D chronological order according to their year of
Library Info

Library Info
establishment:
293. Which of the following is NOT associated with a) Portico
preservation of electronic resources? b) KB e-Depot
A. LOCKS c) LOCKSS
B. CLOCKS d) PMC
C. PORTICO A. (d), (c), (b) and (a)
D. BLOCKS B. (c), (a), (d), and (b)
C. (c), (d), (b) and (a)
Answer: D (BLOCKS)
D. (d), (a), (b) and (c)
294. ESPIDA Institutional Digital Preservation
Answer: C
Program is initiated at __.
A. Stanford University Notes: LOCKSS (1999); PMC (2000); KB e-Depot
B. University of Glasgow (2002); Portico (2005)
C. British Library
D. Helsinki University Library
297. Select the correct combinations:
Answer: B (University of Glasgow) a) ArXiv – Cornell University
b) JSTOR – Princeton University
Notes: The Effective Strategic model for the
c) Highwire & LOCKSS – Stanford University
Preservation and Disposal of Institutional Assets
d) GSDL – Waikato University
(ESPIDA) is a plan to draw up a business-focused model
A. c, and d are correct
for digital preservation at higher education institutions.
B. a, and c are correct
Based in the University of Glasgow, ESPIDA is funded
C. b and c are correct
by the Joint Information Systems Committee (JISC) and
D. a, b, c, and d are correct
runs until December 2006.
Answer: D
295. Select the correct combinations:
a) DORIA – Helsinki University Library Notes: arXiv is an open-access repository of
b) LOCKSS – Stanford University Libraries electronic preprints (known as e-prints) of scientific
c) ESPIDA – University of Glassgow papers in the fields of mathematics, physics,
d) LIFE – British Library astronomy, electrical engineering, computer
A. c, and d are correct science, statistics, and economics, which can be accessed
B. a, and c are correct online. It was developed by Paul Ginsparg, launched in
C. b and c are correct 1991 and now hosted at Cornell University.
D. a, b, c, and d are correct
HighWire Press was founded by Stanford
Answer: D University Libraries in 1995.

124 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII

298. Select the correct combinations: 302. Which technique allows embedding of a visible
a) Ning – Mark Andreessen & Gina Biomchini or invisible copyright notices or other verification
b) First Programmer – Lady Lovelace Ada messages in digital documents?
c) RDF – Tim Berners Lee A. Digital embargo
d) Facebook – Mark Zuckerberg B. Digital Document protecting
A. c, and d are correct C. Digital watermarking
B. a, and c are correct D. Digital clipboarding
Library Info

Library Info
C. b and c are correct
D. a, b, c, and d are correct Answer: C (Digital Watermarking)

Answer: D Notes: Digital Watermarking is the technique of


embedding some identification information known as
299. Select the correct combinations: watermark into the digital data by its owner. Digital
a) Blog – Peter Merholz Watermarking can be used as a tool for discovering
b) Web 2.0 – D. Dougherty & Tim O’Reilly unauthorized data reuse and also for copyright
c) Wiki – H. G. Cunningham protection.
d) Folksonomy – T. Vander Wall
A. c, and d are correct 303. Use of Microfilming is considerably reduced
B. a, and c are correct due to:
C. b and c are correct A. High cost involved in it
D. a, b, c, and d are correct B. Need for use microfilm reader
C. Availability of better technology in the form
Answer: D of digitization
D. All of the above
300. Select the correct combinations:
a) RSS – Netscape Answer: D (All of the above)
b) URL – Tim Berners Lee
c) FRBR – Patrick Le Boeuf 304. Opaque paper is a __.
d) Information Highway – Nam June Paik A. Ultra-white paper
A. c, and d are correct B. Ultra-white thin paper
B. a, and c are correct C. Transparent paper
C. b and c are correct D. Non-Transparent paper
D. a, b, c, and d are correct Answer: D (Non-Transparent paper)
Answer: D 305. Which are widely used by the engineering and
301. Select the correct combinations: architectural industries to preserve drawings,
a) Instagram – Facebook blueprints and maps?
b) Face Time – Apple A. Microfiche
c) Tumblr – Yahoo B. Aperture cards
d) Picasa – Google C. Microfilm
A. c, and d are correct D. Ultrafiche
B. a, and c are correct Answer: B (Aperture cards)
C. b and c are correct
D. a, b, c, and d are correct Notes: An aperture card is a tabulating card with a single
frame of 35mm film mounted within the open aperture.
Answer: D
125 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

Aperture cards were widely used by the engineering and D. 105 pages
architectural industries to preserve drawings, blueprints,
and maps. The standard aperture card measures 3¼ Answer: C (98 pages)
inches wide x 7 3/8 inches in length (86mm x 187mm). 309. Identify the odd one which does not belong to
306. What is the length of 16 mm roll film used for the group:
microfilm? A. Lithography
A. 90 feet or 110 feet B. Reflex Copying
Library Info

Library Info
B. 75 feet or 120 feet C. Thermography
C. 120 feet or 200 feet D. Diazo Printing
D. 100 feet or 215 feet Answer: C (Thermography)
Answer: D (100 feet or 215 feet) Notes: Reprographic methods can be grouped under
Notes: Microfilm comes in rolls that are either 100 feet three broad groups: (i) Photographic methods (Light
or 215 feet long. 100 foot film has normally 0.004 inches sensitive) (ii) Thermographic methods (Heat sensitive),
thickness, where as 215 foot film is normally 0.0025 and (iii) Electrostatic methods (Charge sensitive).
inches in thickness. 16mm roll film is the standard size 310. Who among the following is the inventor of
and most often used for office-sized 8.5×11″ / A4 lithography printing?
documents such as books, periodicals etc. 16mm A. Alois Senefelder
microfilm measures about 5/8” wide. 35mm microfilm is B. Peter Merholz
most often used for oversize documents such as C. E. Williams
drawings, maps and newspapers. D. Jack Dorsey
307. What is the standard size of Microfiche? Answer: A (Alois Senefelder)
A. 4 x 6 inches (105mm x 148mm)
B. 3 x 5 inch (75mm x 125mm) Notes: Lithography is a method of printing originally
C. 2 x 4 inch (55mm x 100mm) based on the mixture of oil and water. The printing is
D. 2 x 3 inch (55mm x 75mm) from a stone (lithographic limestone) or a metal plate
with a smooth surface. It was invented in 1796 by
Answer: A (4 x 6 inches (105mm x 148mm) German author and actor Alois Senefelder as a cheap
Notes: Microfiche are a series of microimages on a flat method of publishing theatrical works.
sheet of 105mm film arranged in a grid pattern. The 311. The concept of Micro Photography was
content is filmed onto 105mm film stock, and then the developed by ___.
roll film is cut into sheets. The most common and A. Johan Gutenberg
standard size of microfiche now being produced B. Chester Cardson
measures 4 x 6 inches (105mm x 148mm). The standard C. John Benjamin Dancer
4 x 6 inches format is usually offered in a format of D. Ohi Battle
60 or 98 pages per fiche. Although microfiche has a
much smaller storage capacity, microfiche sheets may be Answer: C (John Benjamin Dancer)
easier to organize because of their shape and form factor.
Notes: John Benjamin Dancer was a British scientific
308. A standard microfiche can accommodate __. instrument maker and inventor of microphotography- an
A. 75 pages art of making photographs shrunk to microscopic scale.
B. 80 pages He also pioneered stereography.
C. 98 pages
126 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

312. Chester Carlson is related to __. D. Public Key Cryptography


A. E-book
B. NDLTD Answer: D (Public Key Cryptography)
C. Internet Archive Notes: Cryptography is the art and science of secret
D. Xerox Copier writing. It is the science of transforming information into
Answer: D (Xerox Copier) an unintelligible form so that it can be saved from
unauthorized access. Symmetric encryption is a type of
Library Info

Library Info
Notes: Chester Floyd Carlson was an American encryption where only one key (a secret key) is used to
physicist who is best known for having invented the both encrypt and decrypt electronic information.
process of electrophotography/xerography. This encryption method differs from Asymmetric
encryption where a pair of keys, one public and one
313. Identify from the following the Silver Halide private, is used to encrypt and decrypt messages. In
process used in reprography : other words, symmetric Cryptography relies on one key
a) Exposure for both encryption and decryption, whereas
b) Miniature asymmetric cryptography or Public Key
c) Developing cryptography is an encryption method that uses two
d) Rinsing different set of keys - a public key and a private
A. a and b are correct key. The public key is used to encrypt and the private
B. a, c and d are correct key is used to decrypt the messages or information.
C. b, c and d are correct
D. b and c are correct 316. In symmetric key cryptography, the key used by
the sender and the receiver is __.
Answer: B A. Shared
314. ‘Cryptography’ is related with __. B. Different
A. Research Design C. Two keys are used
B. Library Classification D. None
C. Information Security Answer: A (Shared)
D. TQM
Notes: Symmetric encryption is a type of encryption
Answer: C (Information Security) where only one key (a secret key) is used to both
Notes: Cryptography is a method of protecting encrypt and decrypt electronic information.
information and communications through the use of 317. Data Encryption Standard (DES) was designed
codes so that only those for whom the information is by __.
intended can read and process it. It is the practice and A. Intel
study of techniques for secure communication. The B. IBM
first use of the term cryptograph dates back to the 19th C. HP
century—originating from The Gold-Bug, a novel D. Sony
by Edgar Allan Poe.
Answer: B (IBM)
315. The cryptographic technique that uses different
encryption and decryption keys is called: 318. Steganography is a technique for __.
A. Substitutional Cryptography A. Transforming information into an
B. Secret Key Cryptography unintelligible form to save from
C. Traditional Cryptography unauthorized access
127 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

B. Hiding secret data or messages within an Notes: Bitcoin is a decentralized digital currency that
ordinary file or messages to avoid detection can be sent from user to user on the peer-to-peer
or unauthorized access bitcoin network without the need for intermediaries.
C. Adding unnecessary, nonsense data or Transactions are verified by network nodes through
phrases to the beginning, middle or end of a cryptography and recorded in a public distributed ledger
message to obscure the fact called a blockchain. The cryptocurrency was invented in
D. None of the above 2008 by an unknown person or group of people using the
Library Info

Library Info
name Satoshi Nakamoto. The currency began use in
Answer: B 2009 when its implementation was released as open-
Notes: Steganography is the technique of hiding secret source software.
data or message within an ordinary file or message in 321. Which of the following makes a network/web
order to avoid detection and the secret data is then insecure?
extracted at its destination. A. Encryption
319. Which of the following is an example of B. Network Interface Card (NIC)
‘Information Padding’? C. Static keys
A. Inclusion of a source in the bibliography D. None of the above
which is relevant to your work and duly Answer: C (Static keys)
consulted.
B. Inclusion of a source in the bibliography Notes: A static key is one we use more than once over a
though not consulted, but required for long period of time. Static keys are often considered less
further reading. secure than using an Ephemeral key (that changes each
C. Adding of necessary words or information to time).
a speech or piece of work making the same
more shorter 322. What does ‘encrypting a file’ mean?
D. Adding of gratuitous and impertinent words A. Scrambling the contents
or information to a work or piece of writing B. Set the read-only property
or speech extraneously making the same C. Hiding the file
more longer. D. Set a password

Answer: D Answer: D (Set a password)

Notes: In cryptography, padding is ‘adding Notes: Data encryption translates data into another form,
unnecessary, nonsense data or phrases to the or code, so that only people with access to a secret key
beginning, middle or end of a message to obscure the (formally called a decryption key) or password can read
fact’ before encryption. it. Encrypted data is commonly referred to as ciphertext,
while unencrypted data is called plaintext.
320. Who created Bitcoin?
A. Carla Hayden 323. The term ‘Cyphertext’ denotes __.
B. Satoshi Nakamoto A. Braille audio data
C. John Macarthy B. Braille textual data
D. Zenodotous C. Unencrypted data
D. Encrypted data
Answer: B (Satoshi Nakamoto)
Answer: D (Encrypted data)

128 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII

Institutional Repository C. Federated Database System


D. Metadata Harvesting
324. e-Gyankosh – a national digital repository is
implemented by __. Answer: D (Metadata Harvesting)
A. UGC
328. Arrange in sequence, the following
B. NIC
functional entities of the OAIS Reference
C. IGNOU Model that occur in the digital information
D. RRRLF
Library Info

Library Info
life cycle:
a) Administration
Answer: C (IGNOU)
b) Archival storage
325. Identify the following Institutional c) Access
Archives/Repositories freely available: d) Data management
a) Project MUSE e) Ingest
b) Web of Science A. (a), (d), (c), (b), (e)
c) E-prints B. (c), (a), (d), (b), (e)
d) Open DOAR C. (b), (d), (c), (a), (e)
D. (e), (b), (d), (c), (a)
A. a, and b are correct
Answer: D
B. b, and c are correct
C. c and d are correct Notes: The Open Archival Information Systems (OAIS)
D. a, and d are correct Reference Model is a conceptual model for a digital
archive. The OAIS Reference Model produced under the
Answer: C
leadership of the Consultative Committee for Space Data
326. Project MUSE- an online database of academic Systems (CCSDS) was adopted as an ISO standard (ISO
journals and electronic books was founded in 14721) in 2002. 2nd edition of this Reference Model
1993 at ___. was published in 2012. The OAIS archive operates
A. Oxford University within an external environment with three main
B. Stanford University stackholders: (i) Management (ii) Producers, and (iii)
C. University of Southampton Consumers. There are three different types of
D. John Hopkins University information packages that move within the OAIS: (i)
Submission Information Package (SIP), (ii) Archival
Answer: D (John Hopkins University) Information Package (AIP), and (iii) Dissemination
Information Package (DIP). There are six functional
Notes: Project MUSE, a non-profit collaboration
entities within the OAIS Archive – (i) Ingest (ii)
between libraries and publishers, is an online database
Archival Storage (iii) Data Management (iv) Access (v)
of peer-reviewed academic journals and electronic books
Administration, and (vi) Preservation Planning.
on social sciences and humanities. It was founded in
1993 at John Hopkins University, United States and 329. Which of the following is an open access data
available on subscriptions through EBSCO, Elsevier and repository?
ProQuest. A. CKAN
B. Figshare
327. OAISTER is an example of digital libraries
C. DMPTool
architecture based on ___.
D. None of the above
A. CORBA
B. Software Agents Architecture Answer: B (Figshare)
129 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

Notes: The Comprehensive Knowledge Archive workflow, including: article submission, multiple rounds
Network (CKAN) is an open-source open data of peer-review, and indexing.
portal for the storage and distribution of open data. It
was developed by Open Knowledge Foundation. 332. 'Open Journal System' is an example of which of
the following open access models?
Figshare is an online open access repository where A. Green
researchers can preserve and share their research B. Red
outputs, including figures, datasets, images, and C. Gold
Library Info

Library Info
videos. It was launched in 2011 and developed by D. Platinum
Digital Science.
Answer: D (Platinum)
Content Management Systems
333. Select the correct combinations:
330. Who developed ‘Open Journal Systems’ (OJS)? a) OA Gold – Publishing in open access
A. Public Knowledge Project journals with or without author charges
B. The Knowledge Foundation b) OA Green – Publishing in Institutional
C. IFLA Repositories
D. OCLC c) OA Platinum – Publishing in open access
journals with no charge to the authors
Answer: A (Public Knowledge Project) d) Coursera – Platform for offering online
programs/courses
Notes: Open Journal Systems (OJS) is an open-source A. a, and b are correct
free software for the management of peer-reviewed B. a, b and c are correct
academic journals, and is created by the Public C. b, c and d are correct
Knowledge Project, released originally in 2001 under D. a, b, c and d are correct
the GNU General Public License.
Answer: D
331. Which are the following characteristics of Open
Journal Systems (OJS)? Notes: Open Access Journals is usually of two different
a) Facilitate writing platform to author types based on their fee vs. no fee aspect: Gold Open
b) Facilitate paper submission Access (OA Gold) is where an author publishes their
c) Facilitate peer reviewing article in an online open access journal usually with
d) Facilitate golden access model some author fees (APC - Article Processing
Charges). On the contrary, Platinum Open Access (OA
A. c, and d are correct Platinum) refers to open access journals that don't
B. a, and c are correct charge any author fees (APC - Article Processing
C. b and c are correct Charges). They are usually financed by a university or
D. b and d are correct research organization. In contrast, Green Open Access
(OA Green) is where an author publishes their article in
Answer: C any journal and then self-archives a copy in a freely
Notes: Open Journal Systems (OJS) was designed to Coursera, EdX, Udacity, NovoEd. known as a
facilitate the development of open access, peer- repository, or on a website.
reviewed publishing, providing the technical 334. F1000 is now a part of __.
infrastructure not only for the online presentation of A. Taylor & Francis Group
journal articles, but also an entire editorial management B. Elsevier

130 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII

C. Emerald Publishing Service released in 2006); Rosetta (Digital Preservation


D. McGraw-Hill and Asset management platform, released in 2009);
Leganto (Reading List Management Application,
Answer: A (Taylor & Francis Group) released in 2015); CampusM (Mobile campus app
Notes: Faculty 1000 ( F1000) is a publisher of services platform for academic institutions, acquired in 2015);
Aleph (Integrated Library System); Voyager (Integrated
for life scientists and clinical researchers. F1000 was
Library System, acquired in 2006).
founded in United Kingdom (Headquarter in London)
Library Info

Library Info
in the year 2000 by publishing entrepreneur Vitek 337. ‘Ambra’ an innovative open source platform (for
Tracz. It was acquired by Taylor & Francis Group, publishing open access resource articles) is
an Informa Company, in January 2020. developed by:
335. F1000 Research is an open access, peer review A. OCLC
scientific publishing platform mainly in the field B. DOAJ
of __. C. PLOS
D. WDL
A. Social Sciences
B. Life Sciences Answer: C (PLOS)
C. Engineering and Technology
D. Humanities Notes: Ambra is an innovative Open Source platform for
publishing Open Access research articles. It was
Answer: B (Life Sciences) developed by PLOS (Public Library of Science) and is
Notes: Faculty of 1000 (F1000) launched the first ‘open licensed under the MIT License.
research publishing platform’ called ‘F1000 338. ‘Anukriti’ is a __.
Research’ in the year 2013 that mainly covers the life A. Bibliographic India website
sciences. In July 2017, F1000 launched Open Research B. Indexing India website
Central (ORC), a "central portal for open research C. Translating India website
publishing" that runs on F1000 Research Platform. D. Abstracting India website
336. Ex-Libris Esploro – the research services Answer: C (Translating India website)
platform was launched in __.
A. 2015 Notes: ‘Anukriti’ a Translating India website is the
B. 2016 outcome of collaboration among Central Institute of
C. 2018 Indian Languages, Mysore, Sahitya Akademi and
D. 2019 National Book Trust, New Delhi.

Answer: C (2018) 339. OpenDOAR is a ___.


A. Directory of Academic Open Access
Notes: Ex-Libris Esploro launched in 2018 is a research Repositories
service platform that paves the way to greater impact of B. Directory of Public Libraries
academic research by maximizing visibility, efficiency, C. Directory of Special Open Access
and compliance of research activities. Ex-Libris is an Repositories
Israeli software company which provides cloud-based D. Directory of Public Libraries Open Access
library software solutions. The company is now owned Repositories
by ProQuest (since October 2015). The other products of
Ex-Libris company includes: Alma (A SaaS Library Answer: A (Directory of Academic Open Access
Services Platform, released in 2012); Primo (Discovery Repositories)
131 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

Notes: OpenDOAR: Directory of Open Access created by EPrints at University of Southampton, UK,
Repositories is a UK-based website that lists in 2003 with funding from JISC (Joint Information
academic open access repositories. It is maintained by Systems Committee). It began as the Institutional
the University of Nottingham under the SHERPA Archives Registry and was renamed Registry of Open
(Securing a Hybrid Environment for Research Access Repositories in 2006.
Preservation and Access) – an organization set up in
2002 to support open access institutional 343. ROARMAP stands for ___.
A. Registry of Open Access Repository
Library Info

Library Info
repositories based in UK universities.
Mandates and Policies
340. DOAB stands for __. B. Registry of Open Archives Repository
A. Database of Open Access Books Mission and Policies
B. Directory of Open Access Books C. Registration of Online Archives &
C. Database of Online Available Books Repository Mission and Policies
D. Directory of Online Available Books D. None of the above

Answer: B (Directory of Open Access Books) Answer: A (Registry of Open Access Repository
Mandates and Policies)
341. DOAJ (Directory of Open Access Journals) was
initially set up at ___. Notes: Registry of Open Access Repository Mandates
A. Stanford University and Policies (ROARMAP) created by EPrints at
B. Oxford University University of Southampton, UK, is a searchable
C. Lund University international database of policies. It charts the growth
D. Cambridge University of open access mandates and policies adopted by
universities and research institutions of the world.
Answer: C (Lund University)
344. Indentify the services provided under SHERPA
Notes: The Directory of Open Access Journals (DOAJ) Project, UK?
is a website that hosts a community-curated list of open a) SHERPA/RoMEO
access journals, maintained by Infrastructure Services b) SHERPA/JULIET
for Open Access (IS4OA). It was initially started in 2003 c) OpenDOAR
at Lund University. Infrastructure Services for Open d) SHERPA Search
Access (IS4OA) took over the maintenance of DOAJ in A. a, b and d are correct
2013. B. a, b and c are correct
342. Registry of Open Access Repositories (ROAR) C. b, c and d are correct
is funded by: D. a, b, c, and d are correct
A. ISO Answer: D
B. JISC
C. UNESCO Notes: SHERPA/RoMEO – Publisher’s copyright &
D. OCLC archiving policies; SHERPA/JULIET – Research
Funders archiving mandates and guidelines; OpenDOAR
Answer: B (JISC) – worldwide directory of open access repositories;
Notes: The Registry of Open Access Repositories SHERPA Search – simple full text search of UK
(ROAR) is a searchable international database that repositories.
indexes the creation, location and growth of open access
institutional repositories and their contents. ROAR was
132 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

345. Which service of SHERPa is involved in 348. Which of the following organization have
copyright and open access self-archiving policies introduced ‘Digby’- a new mobile application
for academic journals? available as a part of ‘Worldshare Management
A. SHERPA/FACT Service’?
B. SHERPA/RoMEO A. Library of Congress
C. SHERPA/Juliet B. NISCAIR
D. None of the above C. OCLC
Library Info

Library Info
D. UTLAS
Answer: B (SHERPA/RoMEO)
Answer: C (OCLC)
346. SHERPA/RoMEO project was funded by:
A. OCLC Notes: Digby is a mobile application that was made
B. JISC available in 2017 by OCLC as part of library’s
C. British Library WorldShare Management Service (WMS) subscription.
D. W3C
349. Which of the following is the open source
Answer: B (JISC) Electronic Resource Management System
(ERMS)?
Notes: The RoMEO Project (Rights MEtadata for A. 360 Resource Manager
Open archiving) was a JISC funded project (2002/3) at B. CORAL
the University of Loughborough to investigate the C. ALMA
rights issues surrounding the self-archiving of research D. EBSCO ERM Essentials
in the UK community under the Open Archive Initiative
Protocol for Metadata Harvesting (OAI-PMH). Answer: B (CORAL)

347. Which among the following colors are used to Notes: CORAL is an electronic resource management
highlight publishers’ archiving policies under system initially started by the University of Notre
SHERP/RoMEO Project? Dame’s Hesburgh Libraries. CORAL is first released
a) Green in 2010 as open source software under GPL v. 3 and is
b) Blue available on GitHub.
c) Yellow
d) White 350. 360 Resource Manager is associated with __.
A. a, and b are correct A. EBSCO
B. b, and c are correct B. ProQuest
C. b, c and d are correct C. IBM
D. a, b, c, and d are correct D. OCLC

Answer: D Answer: B (ProQuest)

Notes: The four different colors are used to highlight Notes: 360 Resource Manager is a commercial
four different categories of archiving rights under electronic resource management system (ERMS)
SHERPA/RoMEO project: Green - can archive both developed by Ex Libris Group (now part of ProQuest
pre-print and post-print; Blue - can archive post-print; since 2015).
Yellow - can archive pre-print; and White - archiving 351. Identify the content management software from
not formally supported. the following:
A. Library Manager

133 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII

B. Eprint Grav is a free software, self-hosted content management


C. Drupal system (CMS) written in the PHP programming
D. LibSys language. The software was initially released in 2014
under MIT License.
Answer: C (Drupal)
354. Which are Learning Management System from
Notes: Drupal, a free open source software content the following:
management system written in PHP and distributed a) Open Biblio
Library Info

Library Info
under the GNU General Public License. Originally b) Moodle
written and developed by Dries Buytaert in May 2000 c) A Tutor
and currently developed and maintained by Drupal d) New Genlib (NGL)
Community.

352. The first public version of the content A. a, b and d are correct
management system – ‘Ghost’ was released with B. b and c are correct
C. b, c and d are correct
which one of the following names?
D. a, b, c, and d are correct
A. Content Pro
B. Typo3 Answer: B
C. Grav
D. Kerouac 355. ATutor was first released in ___.
A. 2000
Answer: D (Kerouac) B. 2001
C. 2002
Notes: Ghost, a free and open source content
D. 2003
management system, written in javaScript and first
public version released in October 2013 with the name Answer: C (2002)
‘Kerouac’.
Notes: ATutor is an Open Source Web-based Learning
353. Which among the following are the content Content Management System (LCMS), developed in
management systems? PHP and licensed under GPL. ATutor was first released
a) TYPO3 in late 2002.
b) Drupal
c) Ghost 356. ‘Moodle’ is a __.
d) Grav A. OPAC
A. a, and d are correct B. Library Management System
B. a, b and c are correct C. Electronic Library System
C. b, c and d are correct D. Course Management System
D. a, b, c, and d are correct
Answer: D (Course Management System)
Answer: D
Notes: Moodle is a free and open-source learning
Notes: TYPO3 is a free and open-source Web content management system (LMS) written in PHP and
management system written in PHP and developed by distributed under the GNU General Public License. It
TYPO3 Association. It is released under the GNU was originally developed by Martin Dougiamas and the
General Public License. TYPO3 was initially authored first version released in August 2002.
by Kasper Skårhøj in 1997 and initially released in
1998. 357. Knowledge Graph is related to ___.

134 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII

A. Rediff A. Dries Buytaert


B. Yahoo B. Dean Allen
C. Google C. Chester Cardson
D. Altavista D. Ohi Battle

Answer: C (Google) Answer: B (Dean Allen)

Notes: The Knowledge Graph is a knowledge Notes: Textpattern is a free and open-source content
Library Info

Library Info
base used by Google and its services to enhance management system based on PHP and MySQL,
its search engine's results with information gathered originally developed by Dean Allen and now developed
from a variety of sources. The information is presented by Team Textpattern. It was initially released in 2003.
to users in an ‘infobox’ next to the search results. Furthermore, TextDrive – an online hosting service was
Knowledge Graph infoboxes were added to Google's founded in 2004 by Dean Allen.
search engine in May 2012.
361. Concrete5 – an open source Content
358. Impartus is a __. Management System is published under __.
A. Plagiarism detection system A. BSD License
B. Automated audio recording system B. MIT License
C. Automated video capturing system C. GPL License
D. Grammar correction tool D. Apache License

Answer: C (Automated video capturing system) Answer: B (MIT License)

Notes: Impartus is a Bangalore-based private company Notes: Concrete5 is an open-source content


specialized in video technology. Founded in December management system (CMS), developed on PHP, for
2013 by Alok Choudhary, Amit Mahensaria and publishing content on the World Wide Web and
Manish Kumar, the flagship product of Impartus is an intranets. It is released under MIT License.
automated lecture capture system that is typically used to
record all classroom lectures based upon the pre- 362. Kentico is a ___.
configured schedule. A. Content Management System
B. Library Management System
359. Which of the following are free and open source C. Document Management System
Content Management Systems? D. Reference Management System
a) Text Pattern
b) Concrete 5 Answer: A (Content Management System)
c) Content Verse
Notes: Kentico is a proprietary Web Content
d) Kentico Management System developed on ASP.NET. It is
developed by Kentico Software Company which was
A. a, b, and c are correct founded by Petr Palas in 2004.
B. c, b and d are correct
C. a, and b are correct 363. Contentverse is a __.
D. b and c are correct A. Database Management System
B. Library Management System
Answer: C C. Document Management System
360. ‘Textpattern’ an open source CMS was D. Reference Management System
originally developed by: Answer: C (Document Management System)
135 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

Notes: Contentverse is a proprietary document 367. Select the correct combinations:


management system or CMS designed by Computhink, a) Joomla – Open Source Matters
Inc. for use in businesses. The software was originally b) Drupal – Dries Buytaert
released in 1998 as The Paperless Office and rebranded c) Thunder – Hubert Burda Media
in 2013 as Contentverse. d) Textpattern – Dean Allen
A. a, b, and c are correct
364. WordPress- a Content Management System was B. c, and d are correct
first released in __.
Library Info

Library Info
C. a, and b are correct
a) 2002 D. a, b, c, and d are correct
b) 2003
c) 2004 Answer: D
d) 2005
Notes: All the following are Content Management
Answer: B (2003) Systems (CMS): Joomla (Open Source Matters, 2005);
Drupal (Dries Buytaert, 2000); Thunder (Hubert Burda
Notes: WordPress is a free and open-source content Media, 2016) ; Textpattern (Dean Allen, 2003)
management system (CMS) based on PHP & MySQL.
WordPress was released on May 27, 2003, by its 368. The credit to develop the first ‘wiki’ goes to:
founders, Matt Mullenweg and Mike Little of WordPress A. Ward Cunningham
Foundation. B. Dries Buytaert
C. Johan Gutenberg
365. Who among the following is related with Drupal D. Chester Cardson
development?
A. Dries Buytaert Answer: A (Ward Cunningham)
B. Johan Gutenberg
C. Chester Cardson Notes: Ward Cunningham is an American computer
D. Ohi Battle programmer who developed the first wiki. He started
programming the software WikiWikiWeb in 1994 and
Answer: A (Dries Buytaert) installed it on the website of the software consultancy
Cunningham & Cunningham (c2.com). He has authored
Notes: Drupal is a free and open-source content a book about wikis, titled The Wiki Way, first published
management system written in PHP and distributed in 2001.
under the GNU General Public License. It was originally
written by Dries Buytaert and released in 2000. 369. ‘Wikipedia’ owned by the non-profit ‘Wikipedia
Foundation’ was launched on January 15, 2001
366. Joomla is developed by __. by:
A. Open Source Matters, Inc. A. Jimmy wells and Larry Sanger
B. International Standard Organization (ISO) B. Jimmy Wells and Vincent J. Aceto
C. World Wide Web Consortium C. Larry Sanger and W. Kathy
D. UNESCO D. William A. Ford and W. Kathy
Answer: A (Open Source Matters, Inc.) Answer: A (Jimmy Wells and Larry Sanger)
Notes: Joomla! written in PHP, is a free and open- 370. Select the correct combinations:
source content management system (CMS) for a) Survey Monkey – Ryan Finley – Sanmateo,
publishing web content, developed by Open Source California, (USA)
Matters, Inc. and first released in 2005.

136 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII

b) TypeForm – Robert Munoz and David assistance, social networking, an online marketplace, and
Okuniev-Barcelona (Spain) more. Their goal is to provide a single destination for the
c) Client Heartbeat – Gordon Tan –Brisbane social and educational needs of today's students.
(Austria)
d) Survey Gizmo – Christian Vanek and Scott Answer Tips is a tool/service for blogs and websites by
McDaniel- Colorado (USA) answer.com.
A. c, and d are correct
372. Select the correct combinations:
Library Info

Library Info
B. a, and c are correct a) Invenio – Digital Library System
C. a, b, c, and d are correct b) Moodle – Course Management System
D. b and c are correct c) Share Point – Content Management System
Answer: C d) PhpMyAdmin – Web Database Management
A. c, and d are correct
Notes: SurveyGizmo is an online survey software B. a, and c are correct
developed by Christian Vanek and Scott McDaniel in C. b and c are correct
2006 and headquartered in Boulder, Colorado (USA) D. a, b, c, and d are correct

Typeform, founded in 2012 by Robert Munoz and Answer: D


David Okuniev, is a Barcelona-based online software as
a service (SaaS) company that specializes in online form Notes: Invenio, initially developed by CERN, is an open
building and online surveys. source software for the management of digital content in
an institutional repository.
SurveyMonkey is online survey development cloud-
based software as a service company. It was founded in SharePoint, developed by Microsoft Corporation in
1999 by Ryan Finley and Chris Finley and 2001, is a web-based collaborative platform that
headquartered in California (USA) integrates with Microsoft Office. It is a content
management system used for developing websites.
Client Heartbeat is a survey tool for measuring
customer satisfaction. The company was founded by Cloud Computing, Social & Semantic
Gordan Tan in the year 2012 and headquartered in Web
Brisbane (Austria)
373. Who is widely known as ‘Father of the
371. Which of the following are the examples of Internet’?
Web-based learning and education tools? A. Tim Berners Lee
a) Answer Tips B. Vint Cerf
b) Moodle C. Charles Babbage
c) Revish D. Seymour Cray
d) Campusbug
A. c, and d are correct Answer: B (Vint Cerf)
B. a, and c are correct
Notes: Vint Cerf - the co-designer of the TCP/IP
C. b and c are correct
protocols and the architecture of the Internet, is widely
D. a, b, and d are correct
known as the ‘Father of the Internet’.
Answer: D
374. Who invented the World Wide Web (WWW) _.
Notes: Campusbug is a provider of internet services for A. Paul Zurkowski
students. These services include online educational B. Michael Casey
137 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

C. Tim Berners Lee the Internet Society (ISOC) in recognition of


D. Mark Zuckerberg individuals who have made significant contributions to
the development and advancement of the Internet. It was
Answer: C (Tim Berners Lee) started in 2012 on the 20th Anniversary of ISOC.
Notes: WWW (World Wide Web) was invented in 1989 378. Internet Engineering Task Force (IETF) was
by Tim Berners Lee while working at CERN. He is also founded in __.
regarded as the ‘Father of Internet’. A. 1986
Library Info

Library Info
375. When Tim Berners Lee invented World Wide B. 1988
C. 1990
Web (WWW)?
D. 1992
A. 1989
B. 1991 Answer: A (1986)
C. 1992
D. 1994 Notes: The IETF is a large open international
community of network designers, operators, vendors,
Answer: A (1989) and researchers concerned with the evolution of the
Internet architecture and the smooth operation of the
Notes: Tim Berners-Lee invented the World Wide Web
Internet. It was established in 1986 to develop and
(Internet) in 1989.
promote voluntary Internet standards.
376. Tim Berners Lee, Father of WWW is closely
379. Who among the following is the editor of the
associated with __.
academic journal ‘Webology’?
a) European Organization for Nuclear
Research (CERN) A. Alireza Noruzi
b) National Centre for Super Computing B. Mike Krieger
Applications (NCSA) C. Andrew McCollum
D. Kevin Systrom
c) World Wide Web Consortium (W3C)
d) Web Science Research Initiative (WSRI) Answer: A (Alireza Noruzi)

A. a, b and d are correct Notes: Started in 2004 and edited by Alireza Noruzi
B. a, c and d are correct Webology is an international peer-reviewed academic
C. b, c and d are correct journal in English devoted to the field of the World
D. a, b, c, and d are correct Wide Web and serves as a forum for discussion and
experimentation.
Answer: B
380. While evaluating websites, currency refers to __.
377. Internet Hall of Fame – a lifetime achievement A. Ads on the page
award was started in the year __. B. Working links
A. 2009 C. How up-to-date information is
B. 2012 D. Paid sites
C. 2013
D. 2015 Answer: C (How up-to-date Information is)

Answer: B (2012) 381. Which of the following are the criteria for web
evaluation?
Notes: The Internet Hall of Fame is an annual a) Revision
honorary lifetime achievement award administered by
138 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

b) Response time Consortium is responsible for developing protocols and


c) Format guidelines that ensure long-term growth for the Web.
d) Archiving facility
A. b, and d are correct 385. Which of the following are the criteria for
B. a, and c are correct defined open standard in W3C (2006)?
C. b and c are correct a) Transparency and impartiality
D. a, and d are correct b) Maintenance and Relevance
c) Availability and Openness
Library Info

Library Info
Answer: A d) Security and Preservation
A. a and b are correct
382. WWW stands for __. B. a, b and d are correct
A. World Wide Wizard C. c and d are correct
B. World Wide Wonder D. a, b, and c are correct
C. World Wide Web
D. World Wide Website Answer: D

Answer: C (World Wide Web) 386. Identify the characteristics of Library 1.0:
a) User tagging
383. The World Wide Web Consortium (W3C) - the b) Read only catalogue
main international standards organization for c) Print newsletter mailed out
the World Wide Web was founded by: d) Information as conversation
A. Paul Zurkowski A. b, and d are correct
B. Michael Casey B. b and c are correct
C. Tim Berners Lee C. c, and d are correct
D. Mark Zuckerberg D. a and b are correct
Answer: C (Tim Berners Lee) Answer: B
Notes: Founded in 1994 by Tim Berners-Lee, the World Notes: The basic difference between Library 1.0 and
Wide Web Consortium (W3C) is the main international Library 2.0 is that Library 1.0 only allows for
standards organization for the World Wide Web. It was unidirectional flow of information while Library 2.0
founded with the objective to develop Web standards provides multidirectional flow of information as well as
and guidelines designed to ensure long-term growth for it is a read/write type library that gives users the power
the Web. to interact and decide the service they get. The concept
384. What is the tagline of W3C? of Library 2.0 is borrowed from the concept of Web 2.0
with the same philosophy.
A. Connecting people through web
B. Search smarter 387. Who among the following have given the
C. Leading the web to its full potential concept of ‘Library 2.0’?
D. Secure and free web accessibility A. Paul Zurkowski
B. Michael Casey
Answer: C (Leading the web to its full potential)
C. Tim Berners Lee
Notes: The World Wide Web Consortium (W3C) is the D. Mark Zuckerberg
main international standards organization for the World
Wide Web. Founded in 1994 by Tim Berners Lee, the Answer: B (Michael Casey)

139 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII

Notes: ‘Library 2.0’ is a term coined by Michael Casey Notes: Net Neutrality (Internet Neutrality) means that
on his LibrayCrunch blog. ‘Library 2.0’ can be defined telecom and Internet service providers must treat all
as ‘the application of interactive, collaborative, and data on the Internet equally, and not discriminate or
multi-media web-based technologies to web-based charge differently by user, content, site, platform, or
library services and collections’. The focus is on user- application.
centered change and participation in the creation of
content and community. 391. The principle to provide equal access to different
Internet services by telecommunications service
Library Info

Library Info
388. In recent years people can approach government providers is known as ___.
departments or offices through internet and the A. Open Source principle
mechanism is known as: B. Internet governance
A. E-Governance C. Telecommunication Information networking
B. E-Government principle
C. E-Commerce D. Net Neutrality principle
D. E-Governing Body
Answer: D (Net Neutrality principle)
Answer: A (E-Governance)
Notes: Net Neutrality is a principle, which states that all
389. Audiotext services can be used for __. traffic on the internet should be treated equally and
A. Research papers there should be no discrimination by
B. Electronic Storage Telecommunication companies/Internet Service
C. Emails Providers. The service providers should not
D. Horoscope differentiate this service with different forms and
categories of traffic on the internet.
Answer: D (Horoscope)
392. Which of the following committee was
Notes: Voice information services, also known as appointed on issues related to Net Neutrality in
audiotex or audiotext that uses a voice response India?
application permitting users to retrieve information over A. R. S. Sharma
the telephone. Audiotex is used to provide information B. A. K. Bhargava
that seldom changes or that must be available to large C. Vijay Bhatkar
number of callers. Examples of such messages include D. Rahul Khullar
time and temperature, travel directions, web addresses.
The service can be used for weather, horoscope, Answer: B (A. K. Bhargava)
professional advice, fun chat etc.
Notes: The six members committee on Net Neutrality
390. Considering all internet users in India equally under the chairmanship of Shri A. K. Bhargava,
without discriminating or charging differently by advisor, Department of Telecommunication was
user, content, site, platform, application, type of appointed in January 2015. The report of the A K
attached equipment or mode of communication is Bhargava committee was released on 16 July 2015.
known as __.
A. Preferential Net 393. Who regulates issues related to Net Neutrality in
B. Favoured Net India?
C. Reactive Net A. Department of Telecommunication
D. Net Neutrality B. ISP Providers
C. TRAI
Answer: D (Net Neutrality) D. All
140 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

Answer: C (TRAI) around them. Internet of Things (IoT) can be defined as


“a system of interrelated computing devices,
Notes: The rules ensuring Net neutrality in India are at mechanical or digital machines, objects, animals, or
present mainly enforced by the Telecom Regulatory people that are provided with unique identifiers
Authority of India (TRAI). No formal rules have been (UIDs) and the ability to transfer data over a
formed to uphold and enforce net neutrality in India so network without requiring human to human or
far. However, On 8 February 2016, TRAI passed the human to computer interaction”. In short, An IoT
"Prohibition of Discriminatory Tariffs for Data
Library Info

Library Info
network is a collection of interconnected devices that
Services Regulations, 2016", prohibiting telecom communicate with other devices without human
service providers from levying discriminatory rates for involvement.
data.
The term ‘Internet of things (LoT)’ was first coined
394. In OTT media service, OTT stands for __. by Kevin Ashton of Procter & Gamble, in 1999. IoT is
A. Over-the-telecommunication enabled by several technologies including wireless
B. Over-the-television sensor networks, cloud computing, Big data
C. Over-the-top analytics, Embedded Systems, Security Protocols and
D. Over-the-table architectures, communication protocols, web
Answer: C (Over-the-top) services, Mobile Internet, and Semantic Search
engines.
Notes: An over-the-top (OTT) media service is
a media service offered directly to viewers via 396. An Internet of Things (IoT) network is a
the Internet. In broadcasting, over-the-top (OTT) collection of __ devices.
A. Signal
content is the audio, video, and other media content
B. Machine to machine
delivered over the Internet, without the involvement of
a multiple-system operator (MSO) in the control or C. Interconnected
distribution of the content. Over-the-top services are D. Network to network
typically accessed via websites on personal Answer: C (Interconnected)
computers, as well as via apps on mobile devices,
digital media players or televisions with Notes: An IoT network is a collection of interconnected
integrated Smart TV platforms. Some of the most devices that communicate with other devices without
popular OTT providers include Netflix, Amazon Prime human involvement. IoT can be defined as ‘Taking
Video, Disney+ and Hulu. everyday things, embedding them with electronics,
software, sensors and then connecting them to
395. The term ‘Internet of Things’ was coined by __. Internet and enabling them to collect and exchange
A. Kevin Ashton data without human intervention is called as the
B. Andy Grove Internet of Things (IoT)’.
C. L. J. Cook
D. Allan M. Schiffman 397. Sensor is a/an __ component and it collects
surrounding information.
Answer: A (Kevin Ashton) A. Input
Notes: Internet of Things (LoT) is the concept of B. Output
connecting any device to the Internet and to other C. Storage
connected devices. It is a giant network of connected D. None of the above
things and people – all of which collect and share data
about the way they are used and about the environment Answer: A (Input)

141 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII

398. In IoT architecture, the physical components sends a smoke alert message to the user when a fire
include: occurs.
A. Sensors
B. Actuators 400. What is the full form of LPWAN?
C. All the above A. Low Protocol Wide Area Network
D. None of the above B. Low Power Wide Area Network
C. Long Protocol Wide Area Network
Answer: C (All the above) D. Long Power Wide Area Network
Library Info

Library Info
Notes: Main components of Internet of Things (IoT) Answer: B (Low Power Wide Area Network)
architecture includes: (i) Sensing and embedding
components i.e. Sensors, Actuators that collect data (ii) Notes: The full form of the LPWAN is Low Power
Connectivity & Gateways – Sending data to cloud Wide Area Network. LPWAN is a type of wireless
using various protocols, standards and through gateways. telecommunication, and it is specially designed for M2M
Some of the most popular IoT wireless protocols and (Machine to Machine) and IoT devices.
standards used to transfer and exchange data to the next 401. What is the full form of MQTT?
IoT layer for processing include: Bluetooth, Wi-Fi, A. Multi-Queue Telemetry Things
ZigBee, LoRaWAN, DDS, MQTT, cellular, B. Multiple Queue Telemetry Things
etc. Gateways help to pass the incoming raw data from C. Message Queue Telemetry Things
the sensors to reach the cloud. (iii) Cloud based D. Message Queue Telemetry Transport
Services – the processing and making the data useful
and converting the device into ‘smart device’ takes place Answer: D (Message Queue Telemetry Transport)
in cloud (iv) Analytics and Data management - IoT
Analytics is used to make sense of the vast amounts of Notes: The full form of the MQTT is Message Queue
analog data. (v) User Interface and End-User Devices Telemetry Transport. It is a lightweight messaging
- A user may interact with the system via the device protocol that runs over the TCP / IP protocol. It was
itself, or this interaction can be conducted remotely via designed to create a reliable standard for machine-to-
smartphones, tablets, and laptops. Examples are machine (m2m) communication especially in IoT
Amazon Alexa or Google Home (Now Google Nest) network.
etc. which allow users to communicate with their
402. Network access to a shared pool of configurable
“things”.
computing resources is called as __.
399. Which of the following is an IoT devices? A. Client server
A. Amazon echo voice controller B. Crowd sourcing
B. Google Home C. Cloud computing
C. Nest Smoke Alarm D. Consortium
D. All the above
Answer: C (Cloud Computing)
Answer: D (All the above)
Notes: Cloud computing is a model for enabling
Notes: These are all IoT devices. Google Home convenient, on-demand network access to a shared pool
(Renamed now ‘Google Nest) is a smart speaker that of configurable computing resources (e.g., networks,
obeys all the commands given by the user. The Amazon servers, storage, applications, and services) that can be
Echo Voice Controller (Amazon Alexa) is also a smart rapidly provisioned and released with minimal
speaker. The Nest Smoke Alarm is an IoT device that management effort or service provider interaction.

142 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII

403. Which of the following has ‘Cloud computing’ Answer: D


based data storage facility?
A. Play Store Notes: Arch Mobile Portal is a NewYork University’s
B. G-mail storage mobile library website that offers a search facility for
C. Drop box university electronic resources collection by title, subject
D. Both (B) and (C) or format.

Answer: D OverDrive Inc. founded in 1986 in United States, is a


Library Info

Library Info
digital distributor of eBooks, audiobooks, online
404. The concept of ‘Cloud Computing’ was first magazines, and streaming video titles. The service is
proposed by __. used by publishers and libraries.
A. J.C.R. Licklider
B. Tim Berners Lee 407. New Delivery application software ‘SaaS’
C. Ray Tomlinson (Software as a Service) is ___.
D. None of the above A. Running remotely on a Web server which
the user can access by using a web browser
Answer: A (J. C.R. Licklider) B. Installed and run on a user’s computer
C. Available only through a gateway
Notes: The concept of Cloud computing was initially D. A Hardware required for a WAN
discussed by J.C.R. Licklider in the early 1960’s.
Answer: A
405. Who is believed to have coined the term ‘Cloud
Computing’? Notes: Generally, cloud computing are of three types:
A. Tim Berners Lee IaaS (Infrastructure as a Service), PaaS (Platform as a
B. Eric Schmidt Service) and SaaS (Software as a Service). SaaS is a
C. Ray Tomlinson software distribution model in which a third-party
D. Vint Cerf provider hosts applications and makes them available to
customers over the internet. A simple example of SaaS is
Answer: B (Eric Schmidt) an online email service, like Gmail. If you use Gmail,
Notes: Google CEO Eric Schmidt is said to have coined you are not hosting your own email server. Google is
the term ‘Cloud Computing’ in the year 2006. However, hosting it, and you are simply accessing it through your
Professor Ramnath Chellappa is often credited with browser-as-client.
being the person who coined and defined the term 408. The other name of HaaS is:
“cloud computing” in its modern context, at a lecture A. SaaS
delivered in 1997. B. IaaS
406. Select the correct combinations: C. PaaS
a) Altarama – SMS Reference service D. Web 2.0
b) PocketCirc – Mobile library circulation Answer: B (IaaS)
c) Arch mobile portal – Mobile library website
d) OverDrive – Mobile collection Notes: Hardware as a Service (HaaS) is the next form of
A. a, b, and d are correct service available in cloud computing. Where SaaS
B. a, c and d are correct (Software as a Service) and PaaS (Platform as a Service)
C. a b, and c are correct are providing applications to customers, HaaS simply
D. a, b, c, and d are correct offers the hardware to its clients. Hardware as a service
(HaaS) refers to managed services where computing
143 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

power is leased from a central provider. This model is Azure is a cloud computing service created by
similar to other service-based models, where users rent, Microsoft Corporation in 2010 that offers three
rather than purchase, a provider's tech assets HaaS is main cloud computing platform services: SaaS –
sometimes also called Infrastructure as a Service (IaaS). Software as a Service, IaaS – Infrastructure as a
Service and PaaS – Platform as a Service.
409. Azure is a cloud computing platform of __.
A. Microsoft 411. WordNet is ___.
B. Amazon A. A networking programme
Library Info

Library Info
C. Google B. A thesaurus
D. Hewlett Packard C. An ontology
D. A library network
Answer: A (Microsoft)
Answer: C (An ontology)
Notes: Azure, initially released in February 2010, is a
cloud computing service created by Microsoft Notes: WordNet is a lexical database for the English
Corporation for building, testing, deploying, and language developed by George Armitage Miller in
managing applications and services through Microsoft- 1985 at Princeton University. It groups English words
managed data centers. Azure offers three main cloud into sets of synonyms called synsets, provides short
computing platform services: SaaS – Software as a definitions and usage examples, and records a number of
Service. IaaS – Infrastructure as a Service. PaaS – relations among these synonym sets. WordNet is thus a
Platform as a Service. combination of dictionary and thesaurus.

410. Which of the following are suitable examples of 412. Select the correct combinations:
IaaS? a) Folksonomy – Thomas Vander Wal
a) Eucalyptus b) Web Log – John Barger
b) OpenNebula c) Net Neutrality – Tim Wu
c) FreshBooks d) Semantic Web – Tim Berners Lee
d) Microsoft Azure A. c, and d are correct
A. a, b, and d are correct B. a, and c are correct
B. a, c and d are correct C. b and c are correct
C. a b, and c are correct D. a, b, c, and d are correct
D. b and d are correct
Answer: D
Answer: A
413. Tagging in Web 2.0 application is called __.
Notes: FreshBooks is accounting software, initially A. Taxonomy
released in 2004 and operated by 2ndSite Inc. It is B. Folksonomy
web-based software as a service (SaaS) model, C. Syndication
which can be accessed through a desktop or mobile D. Directory
device.
Answer: B (Folksonomy)
Eucalyptus and OpenNebula are open source Notes: Folksonomy is a user-generated system of
software that provides Infrastructure As A Service
classifying and organizing online content into
(IaaS) cloud computing model for private, public
different categories by the use of metadata such as
and hybrid cloud platforms.
electronic tags. In other words, Folksonomy is the
system in which users apply public tags to online items
144 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

in order to make those items easier for themselves or 416. The process by which many users add metadata
others to find later. The practice is also called social in the form of keywords to shared content is
tagging and social indexing. The term, Folksonomy was called __.
coined by Thomas Vander Wal in 2004. A. Folksonomy
B. Taxonomy
414. Select the correct combinations” C. Autocomplete System
a) AIRS – Taxonomy D. Cognitive System
b) IPSV – Thesaurus
Library Info

Library Info
c) GCL – Government Category List Answer: A (Folksonomy)
d) LGAL – Local Government Category List
A. c, and d are correct Notes: Folksonomy is also called social tagging, "the
B. a, and c are correct process by which many users add metadata in the form
C. b and c are correct of keywords to shared content".
D. a, b, c, and d are correct 417. The concept of ‘Folksonomies’ is associated
Answer: D with __.
A. Blogging
Notes: The AIRS/211 LA County Taxonomy of B. Social Tagging
Human Services provides a standard language and C. Chatting
terminology for information and referral providers in D. None
United States and Canada. It is a hierarchical system that
contains more than 9,200 terms that cover the complete Answer: B (Social Tagging)
range of human services. 2-1-1 is a three digit telephone
Notes: Folksonomy is also called social tagging, "the
number used in the US and Canada that connects callers
process by which many users add metadata in the form
to a full range of community, social and government of keywords to shared content".
services information. AIRS (Alliance for Information
and Referral Systems) is the accrediting body of the 2- 418. Which of the following is the correct statement
1-1 centers. in the context of Web 2.0 facilities?
A. Communication on these facilities is mostly
The Integrated Public Sector Vocabulary (IPSV) is one-way
a controlled vocabulary for describing subject elements B. Content on these facilities is generated
of metadata used in United Kingdom’s e-GMS (e- mostly by users
Government Metadata Standard) and was first C. These facilities are much more cheaper to
released in April 2005. It merged earlier lists: the GCL establish
(Government Category List) and LGCL (Local D. These facilities use more advanced
Government Category List). It is fully compliant with distribution technologies
ISO 2788.
Answer: B (Content on these facilities is generated
415. A system of categorizing relevant content online mostly by users)
with the help of tag is called:
A. Folksonomy 419. Which of the following is characteristic of Web
B. Taxonomy 2.0 applications?
C. Autocomplete System A. Multiple users schedule their time to use
D. Cognitive System Web 2.0 applications one by one

Answer: A (Folksonomy)

145 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII

B. Web 2.0 mainly focused on the ability for and participatory culture by making Web as an
people to collaborate and share information interactive experience rather one-way conversation as in
online the past. The web technologies like HTML5, CSS3 and
C. Web 2.0 applications provide users with Javascript frameworks and AJAX were used in this
content rather than facilitating users to generation.
create it
D. Web 2.0 applications use only static pages The term "Web 2.0" was coined by Darcy DiNucci in
her article ‘Fragmented Future’ published in January
Library Info

Library Info
Answer: B 1999 and later popularized by Tim O'Reilly and Dale
Dougherty. Examples of the types of Web 2.0 tools
420. Which of the following are not web 2.0 Tools? include: Social networking sites (eg. Facebook,
a) Ontologies LinkedIn); Blogs (eg. Wordpress); Microblogs (eg.
b) Facebook Twitter); Wikis (eg. MediaWiki and PBworks); Social
c) Intelligent Web bookmarks/tags (e.g. Delicious and Diigo); Media
d) RSS Feeds Sharing tools (e.g. YouTube and Flickr); Web-based
A. a and b are correct Office tools (e.g. Google Apps’s documents,
B. a, b and d are correct presentations, calendar); Enterprise social network
C. c and d are correct system (ESN) (e.g. Yammer, Jive).
D. a, and c are correct
422. Which of the following is NOT characteristics of
Answer: D Web 2.0?
421. Who among the following is associated with the A. Podcasting
B. Tagging
term ‘Web 2.0’?
C. Semantic Web
A. Bill Gates
B. Yahoo D. Social media
C. Google Answer: C (Semantic Web)
D. Tim O’Reilly
Notes: Semantic Web is the characteristics of Web 3.0.
Answer: D (Tim O’Reilly)
423. A set of best practices for publishing and
Notes: Web 1.0 (1989-2004): Web 1.0 (originated by interlinking structured data on the web is known
Tim Berners Lee) refers to the first stage of the World as:
Wide Web where content creators were few and most of A. Distributed data
the users simply act as passive viewers or consumers of B. Web data
content. Web 1.0 allows users to search and access to C. Unmarked data
limited information with little or no user interaction. D. Linked data
Web 1.0 is also called Static Web or Read Only Web.
Answer: D (Linked data)
Web 2.0 (2004- Present): Web 2.0 is the name used to
describe the second generation of the World Wide Web, 424. Which of the following is not related to Linked
where it moved from static HTML pages to a more Open Data?
interactive and dynamic web experience. Web 2.0, also A. RDF
called Social Web or Read and Write Web, is focused B. HTTP
on the ability for people to collaborate and share C. URI
information online via social media, blogging and Web- D. Z39.50
based communities. It promoted user generated content
146 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

Answer: D (Z39.50) B. Freedom of a file


C. Friend of a friend
Notes: In computing, linked data is a structured data D. Freedom of a friend
which is interlinked with other data in order to become
more useful through semantic queries. It builds upon Answer: C (Friend of a friend)
three standard Web technologies such
as HTTP, RDF and URIs. The term ‘Linked Data’ was Notes: FOAF (Friend of a friend) is a machine-
coined in 2006 by Tim Berners Lee, director of the readable ontology describing persons, their activities
Library Info

Library Info
World Wide Web Consortium (W3C). Linked Open and their relations to other people and objects. FOAF
Data (LOD) refers to publishing and connecting is a descriptive vocabulary expressed using
structured data on the Web for use in public domain. the Resource Description Framework (RDF) and
the Web Ontology Language (OWL). Computers may
425. UMBEL stands for __. use these FOAF profiles to find, for example, all people
living in Europe, or to list all people both you and a
A. Upper Mapping and Binding Exchange friend of yours know. The FOAF project was started in
Layer 2000 by Libby Miller and Dan Brickley and can be
B. Upper MARC and Binding Exchange considered as the first social semantic web application.
Language
C. Upper MARC and Binding Exchange 428. Which one of the following is the Linked Open
Layer Data Project of Thomson Reuters?
D. Upper Mapping and Book Exchange A. UMBEL
Language B. OpenCalais
C. GRID
Answer: A (Upper Mapping and Binding D. Geo Names
Exchange Layer)
Answer: B (OpenCalais)
Notes: UMBEL provides a general vocabulary of
classes and predicates for describing domain Notes: OpenCalais, first launched in 2008, is a free
ontologies, with the specific aim of promoting service by Thomson Reuters that automatically
interoperability with external datasets and domains. extracts semantic information from web pages in a
It is a class structure used in Linked Data, along format that can be used on the semantic web.
with OpenCyc, YAGO, and the DBpedia ontology.
UMBEL is written in the Semantic Web languages 429. The Semantic Web is also known as:
of SKOS and OWL 2. A. Web 2.0
B. Web 3.0
426. Identify the service that is made available C. WikiWikiWeb
through web 3.0 technologies? D. Social Web
A. Message Board
B. FOAF Answer: B (Web 3.0)
C. Flikr
Notes: Web 3.0 was originally called the Semantic Web
D. Mashup
by World Wide Web inventor Tim Berners-Lee, and
Answer: B (FOAF) was aimed at being a more autonomous, intelligent, and
open internet. Web 3.0 is the upcoming third
427. In the context of semantic web, FOAF stands for generation of the Internet where websites and apps will
__. be able to process information in a smart human-like
A. Field of a file way through technologies such as Artificial
147 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

Intelligence, Machine Learning and Big data. In Web b) Ontologies


3.0, data will be interconnected in a decentralized way, c) URI
in contrast to the current generation of the internet (Web d) Cloud seeding
2.0), where data is mostly stored A. a and b are correct
in centralized repositories. In addition, in web 3.0, users B. a, b and d are correct
and machines will be able to interact with data with the C. c and d are correct
adoption of artificial intelligence (AI) along with D. a, b, and c are correct
Library Info

Library Info
semantic web technologies. Web 3.0 is also called
‘Read, Write & Execute’ Web. Answer: D

430. The term ‘Web 3.0’ is coined by __. Notes: The Semantic Web is an extension of the World
A. Tim Berners Lee Wide Web through standards by the World Wide Web
B. John Markoff Consortium (W3C).The standards promote common
C. Michael Cassey data formats and exchange protocols on the Web, most
D. Tim O’Reilly fundamentally the Resource Description Framework
(RDF). According to the W3C, "The Semantic Web
Answer: B (John Markoff) provides a common framework that allows data to be
shared and reused across application, enterprise, and
Notes: The term Web 3.0 is coined by John Markoff of community boundaries". The term was first coined by
the New York Times in 2006, referring to a upcoming Tim Berners Lee for a Web of Data that can be
third generation of web. Whereas, Tim Berners Lee, the processed by machine.
inventor of World Wide Web, called the Web 3.0 as
Semantic Web. Cloud seeding, often called weather modification, is a
scientific process intended to enhance rain and snow,
431. Identify the web 3.0 features from the following: reduce hail damage, and alleviate fog. The technique that
a) Blogs uses dry ice, silver iodide and salts to enhance ice crystal
b) Folksonomy formation in clouds for artificial rain.
c) Semantic web
d) Net vibes 433. Select the correct features of Web 3.0 from the
A. b, and d are correct following:
B. c, b and d are correct a) Ubiquity
C. c, and d are correct b) Semantic Web
D. a and b are correct c) Artificial Intelligence
d) 3D Graphics
Answer: C A. c, and d are correct
B. a, and c are correct
Notes: Netvibes is a French company founded in 2006.
C. b and c are correct
Netvibes is the all-in-one dashboard intelligence
platform for real-time social media monitoring, news D. a, b, c, and d are correct
aggregation, social analytics and data visualization. Answer: D
Netvibes enables organizations to gather, align and
enrich Big data and to deliver that information the way Notes: Ubiquity means being or having the capacity to
users want to receive it. be everywhere, especially at the same time. In other
words, omnipresent.
432. Semantic Web is based on which of the
following: Semantic(s) is the study of the relationship between
a) RDF words. According to Tim Berners Lee, Semantic web
148 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

enables computers to analyze loads of data from the 436. Ontologies consist of the following components:
web, which includes content, transactions and links A. Label, Directory, Data and Separator
between persons. Semantic web improves web B. Substance, Attributes, Relations and
technologies in order to generate, share and connect Functions
through search and analysis based on the ability to C. Entities, Attributes, Relations and Functions
understand the meaning of words, rather than on D. Concepts, Attributes, Relations and
keywords or numbers. Instances
Library Info

Library Info
Artificial Intelligence (AI) is nothing but ‘intelligence Answer: D (Concepts, Attributes, Relations and
demonstrated by machines’. Web 3.0 machines can read Instances)
and decipher the meaning and emotions conveyed by a
set of data which shows the characteristics of intelligent Notes: Most ontologies have components such as:
machines. individuals (instances), classes (concepts), attributes,
and relations.
3D Graphics: The three dimensional design (i.e.
Computer games, ecommerce, geospatial contexts, etc) 437. Which among the following W3C standards are
will be used extensively in websites and services in Web related with RDF?
3.0. a) RDFS
b) RIF
434. OWL stands for ___. c) OWL
A. Web Ontology Language d) RAF
B. Online Website Language A. a, b and d are correct
C. Onsite Wide Language B. a, b and c are correct
D. Ontology Website Language C. b, c and d are correct
D. a, b, c, and d are correct
Answer: A (Web Ontology Language)
Answer: B
Notes: The Web Ontology Language (OWL) is a
family of knowledge representation languages for Notes: The Rule Interchange Format (RIF) is a W3C
authoring ontologies. It defines structure of knowledge Recommendation. RIF is part of the infrastructure for
for various domains: the nouns representing classes of the semantic web, along with SPARQL, RDF, RDFS
objects and the verbs representing relations between and OWL. RIF became a W3C Recommendation on
the objects. OWL is built upon the RDF and RDFS - June 22, 2010.
the World Wide Web Consortium's (W3C) standard for
objects. OWL and OWL 2 were released as W3C 438. Resource Description Framework (RDF)
specifications in the year 2004 and 2009 respectively. consists which of the following?
a) Subject
435. A language defined for ontologies development b) Thread
that provides description for classes and properties c) Predicate
of RDF resources is called: d) Object
A. RDF/XML
B. OWL A. a, b, and c are correct
C. Turtle B. c, b and d are correct
D. RDF Schema C. a, c, and d are correct
D. c, a and b are correct
Answer: B (OWL)
Answer: C
149 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

Notes: The RDF data model is similar to classical B. Classification of internet-based documents
conceptual modeling approaches (such as entity– C. Cataloguing of internet-based documents
relationship). It is based on the idea of D. Documentation service
making statements about resources (in particular web
resources) in the form of expressions i.e. subject– Answer: B (Classification of internet-based
predicate–object, known as triples. The subject denotes documents)
the resource, and the predicate denotes traits or aspects
442. Which of the following are the Semantic Web
Library Info

Library Info
of the resource, and expresses a relationship between
technologies?
the subject and the object. The Resource Description
Framework (RDF) is a family of World Wide Web a) SKOS
Consortium (W3C) specifications originally designed as b) AJAX
a metadata data model in 1997. RDF was adopted as a c) SPARQL
W3C recommendation in 1999. The RDF 1.0 d) UTF
specification was published in 2004, the RDF 1.1 A. a and b are correct
specification in 2014. B. a, b and d are correct
C. c and d are correct
439. Which language is used for developing RDF? D. a, and c are correct
A. RDF/HTML
B. HTML/RDF Answer: D
C. RDF/SGM
D. RDF/XML Notes: The term ‘semantic web’ refers to W3C’s vision
of the web of linked data. Semantic Web technologies
Answer: D (RDF/XML) enable people to create data stores on the web, build
vocabularies, and write rules for handling data. Linked
Notes: RDF documents are written in XML. The XML
data are empowered by technologies such as RDF,
language used by RDF is called RDF/XML.
SPARQL (an RDF query language), OWL (Web
440. RDFS (Resource Description Framework Ontology Language), and SKOS (Simple Knowledge
Schema) was first published in __. Organization System).
A. 1998
B. 1999 443. SKOS Stands for __.
C. 2000 A. Sample Knowledge Organization System
D. 2005 B. Simple Knowledge Organization System
C. Similar Knowledge Organization System
Answer: A (1998) D. Single Knowledge Organization System
Notes: RDFS (Resource Description Framework Answer: B (Simple Knowledge Organization System)
Schema) is a set of classes with certain properties using
the RDF extensible knowledge representation data Notes: Simple Knowledge Organization
model, providing basic elements for the description System (SKOS) is a W3C recommendation designed for
of ontologies. The first version was published by the representation of thesauri, classification
World-Wide Web Consortium (W3C) in April 1998, and schemes, taxonomies, subject-heading systems, or any
the final W3C recommendation was released in February other type of structured controlled vocabulary. SKOS is
2004. part of the Semantic Web family of standards built
upon RDF and RDFS, and its main objective is to
441. Ontology is __. enable easy publication and use of such vocabularies
A. Indexing method
150 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

as linked data. SKOS was first started in 1997 by D. Email ID


World Wide Web Consortium (W3C).
Answer: A (DOI)
444. Powerset and Evri are __.
A. Web Scale Discovery Services Notes: In computing, a Digital Object Identifier (DOI)
B. Semantic Search Tools and Databases is a persistent identifier or handle used to uniquely
C. Meta-search Engines identify objects, standardized by the International
D. General Search Engines Organization for Standardization (ISO). It was first
Library Info

Library Info
introduced in 2000 by International DOI Foundation
Answer: B (Semantic Search Tools and Databases) (IDF).

445. Which of the following are Web-zine? 448. Digital Object Identifier (DOI) is an __.
a) Email Magazine A. Internet based global network and resolution
b) E-Conference system
c) Online Bulletin B. Internet based global naming and resolution
d) Electronic News Letter system
A. a, b, and d are correct C. Internet based global network and repository
B. a, c and d are correct system
C. a b, and c are correct D. Internet based global naming and repository
D. b and d are correct system

Answer: B Answer: B (Internet based global naming and


resolution system)
Notes: Web-zine is a "Web Magazine", a magazine
published on the internet. Notes: The Digital Object Identifier (DOI) is an
Internet- based global naming and resolution system that
446. The @ sign representing ‘at’ in emails to provides for the precise identification, retrieval, and
connect the username with destination thus trading of digital items in the form of articles, books,
forming part of an email ID was first used by: images, videos, charts, tables, audio, and other electronic
A. Alan Kay files.
B. Ray Tomlinson
C. Ted Nelson 449. A unique code preferred by publishers in the
D. Vint Cerf identification and exchange of the content of a
digital object, such as a journal article, Web
Answer: B (Ray Tomlinson) document, or other item of intellectual property is
called __.
Notes: Raymond Tomlinson was a pioneering
American computer programmer who implemented the A. URL
first email program on the ARPANET system, the B. Digital Object Identifier
precursor to the Internet, in 1971; he is internationally C. RFID
D. Digital code
known and credited as the inventor of email.

447. Which of the following helps in consistently Answer: B (Digital Object Identifier)
identifying an electronic object? 450. ISO 26324: 2012 is a standard for ___.
A. DOI A. RFID in Libraries
B. URL B. DOI
C. Web address C. Dublin Core
151 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

D. Inter Library Transaction 455. Weblogs are used to create the website for __.
A. Research Information
Answer: B (DOI) B. Public Information
451. SMAC stands for __. C. Publishing Information Regularly
A. Social, mobile, analytics and cloud D. Web Designers Information
B. Simple Machine Automated Code Answer: C (Publishing Information Regularly)
C. Simple Mobile Automation Code
Library Info

Library Info
D. Social Machine Automated Code 456. A Blog usually provides:
a) a commentary on a particular subject.
Answer: A (Social, mobile, analytics and Cloud)
b) a personal online diary.
Notes: SMAC (social, mobile, analytics and cloud) is the c) an online brand advertising of a
concept that the convergence of four technologies is particular individual or company.
currently driving business innovation. d) an exclusive pre-paid publishing tool
and non-instructional and non-
452. The term ‘Weblog’ was coined by:
A. E. Williams illustrative resource for the scribe
B. Jack Dorsey A. a, b, and d are correct
C. Jorn Bargar B. a, c and d are correct
D. Peter Merholz C. a b, and c are correct
D. b and d are correct
Answer: C (Jorn Bargar)
Answer: C
Notes: The term "weblog" was coined by Jorn Barger on
December 17, 1997. Notes: A weblog or blog is a listing of text, images, or
other objects that are arranged in a chronological order
453. Who has coined the term ‘blog’? that first started appearing in 1998. Blogs are often
A. John Berger maintained and run by a single individual, updated daily,
B. Peter Merholz or contain personal remarks about a topic, a personal
C. Michael Zeinne ramble, or an update on the person's life.
D. David Weiner
457. Which among the following is blogging
Answer: B (Peter Merholz) platform?
A. Blogger
Notes: Peter Merholz, co-founder of ‘Adaptive Path’, B. WordPress
has first coined the term ‘Blog’ in 1999. The term ‘Blog’ C. LiveJournal
is a short form of ‘Weblog’. D. All the above
454. Who coined the term ‘Blogger’? Answer: D (All the above)
A. Evan Williams
B. Jack Dorsey Notes: LiveJournal – a Russian blogging platform and
C. Jorn Bargar social networking sites, founded in 1999 by Brad
D. Peter Merholz Fitzpatrick.

Answer: A (Evan Williams) Blogger – An American blog-publishing service


developed by Evan Williams in 1999 at Pyra Labs,
Notes: Evan Williams later popularized the term ‘Blog’ which was later bought by Google in 2003. The blogs
and devised the term ‘blogger’.
152 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

are hosted by Google and generally accessed from a Bernstam, and headquartered in San Francisco,
subdomain of blogspot.com. California, United States.

458. What is the use of bookmarks in Internet 461. Which of the following is not an acronym for
browsing? RSS?
A. To select a book for downloading A. Really Simple Syndication
B. To mark the pages of a book you are reading B. Really Super Syndication
online C. Rich Site Summary
Library Info

Library Info
C. To save the web pages for future use D. RDF Site Summary
D. To select a book, file or a program for
downloading Answer: B (Really Super Syndication)

Answer: C (To save the web pages for future use) 462. RSS Feed was first created by __.
A. Dan Libby and Ramanathan V. Guha
459. Which one of the following is NOT a B. Alois Senefelder and Jack Dorsey
bookmarking website? C. Peter Merholz and E. Williams
A. Delicious.com D. None of the above
B. Netvouz.com
C. Diigo.com Answer: A (Dan Libby and Ramanathan V. Guha)
D. Revish.com Notes: RSS (originally RDF Site Summary; later, two
Answer: D (Revish.com) competing approaches emerged, which used the
acronyms Rich Site Summary and Really Simple
Notes: Delicious, founded by Joshua Schachter and Syndication respectively) is a type of web feed which
Peter Gadjokov in 2003 and acquired by Yahoo! in allows users and applications to access updates to
2005, was a social bookmarking web service for websites in a standardized, computer-readable format.
storing, sharing, and discovering web bookmarks. These feeds can allow a user to keep track of many
different websites in a single news aggregator. RDF Site
Netvouz is a social bookmarking service that allows to Summary, the first version of RSS, was created by Dan
save favorite links online and access them from Libby and Ramanathan V. Guha at Netscape in March
anywhere. 1999.
Diigo, first launched in 2006, is a social bookmarking 463. RSS feed is a tool of __.
website that allows signed-up users to bookmark and tag A. Web 2.0
Web pages. B. Web 1.0
C. Web 3.0
460. Scribd is __.
A. Email client D. Graphic Design
B. Blog Answer: A (Web. 2.0)
C. Chat server
D. File sharing repository 464. RSS Feed is generally arranged in __.
A. Alphabetical order
Answer: D (File sharing repository) B. Chronological order
C. Reverse Chronological order
Notes: Scribd began as a site to host and share
documents. Scribd Inc. is an American e- D. Subject-wise
book and audiobook subscription service founded in Answer: C (Reverse Chronological order)
2007 by Trip Adler, Jared Friedman, and Tikhon
153 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

Notes: An RSS (Really Simple Syndication) feed is an Answer: A (MediaWiki)


online file that contains details about every piece of
content a site has published. Each time a site publishes a Notes: MediaWiki and PBWorks are both Wiki
new piece of content, details about that content— application software but PBWorks is a commercial
including the full-text of the content or a summary, software developed by David Weekly in 2005.
publication date, author, link, etc.—are automatically
468. Mediawiki is developed by __.
generated in the file and displayed in reverse
A. Magnus Manske and Lee Daniel Crocker
Library Info

Library Info
chronological order(newest first). In short, RSS feed is B. David Weekly and Ramit Sethi
a technology that is being used to keep track the C. Ohi Battle and Chester Cardson
content of your favorite websites. This is the way to D. None of the above
get only desired websites content without actually
logging into the sites individually. Answer: A (Magnus Manske and Lee Daniel Crocker)

465. RSS Feed is coded in __. Notes: MediaWiki, developed by Magnus Manske
A. HTML and improved by Lee Daniel Crocker, is a free and
B. XML open-source wiki software which allows users to create
C. TIFF and collaboratively edit "pages" or entries via a web
D. SGML browser. . It was developed for use on Wikipedia in
2002, and given the name "MediaWiki" in 2003.
Answer: B (XML)
469. Who among the following is the developer of
Notes: RSS feeds are typically coded in XML format, PBworks – collaborative editing software?
so to turn an RSS feed into something readable, you A. Chester Cardson
need an RSS reader. B. Ohi Battle
466. Which among the following is a popular RSS C. David Weekly
reader/News aggregator application? D. Lee Daniel Crocker
A. PBWorks Answer: C (David Weekly)
B. Feedly
C. Mediawiki Notes: PBworks is a commercial real-time collaborative
D. Nook editing system used for the creation of Wikis, developed
by David Weekly in 2005.
Answer: B (Feedly)
470. Which of the following is an example of
Notes: Feedly is a news aggregator application/RSS Microblogging ?
reader for various web browsers and mobile devices A. Word Press
running on iOS and Android. It compiles news feeds B. Blog spot
from a variety of online sources for the user to customize C. LiveJournal
and share with others. Feedly was first released by D. Twitter
DevHD in 2008.
Answer: D (Twitter)
467. Which among the following is open source Wiki
Notes: Microblogging is a web service that allows the
application software? subscriber to broadcast short messages to other
A. MediaWiki subscribers of the service. Examples of Microblogging
B. PBWorks sites are: Tumblr, Twitter, Friendfeed, Plurk.
C. Clinfowiki
D. Feedly 471. Twitter was launched in ___.
154 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

A. 2005 Notes: Instagram, owned by Facebook and created by


B. 2006 Kevin Systrom and Mike Krieger, launched in October
C. 2007 2010.
D. 2008
475. ‘Instagram’ was acquired by Facebook in the
Answer: B (2006) year:
A. 2008
Notes: Twitter was created by Jack Dorsey, Noah B. 2010
Glass, Biz Stone, and Evan Williams in March 2006 and
Library Info

Library Info
C. 2012
launched in July 2006. It was founded in California, D. 2014
United States.
Answer: C (2012)
472. How many characters are now allowed in a
single tweet? 476. Telegram software was first released in __.
A. 140 A. 2011
B. 160
B. 2013
C. 240
D. 280 C. 2015
D. 2016
Answer: D (280)
Answer: B (2013)
Notes: Tweets were originally restricted to 140
characters, but on November 7, 2017, this limit was Notes: Telegram, a cloud-based instant
doubled (280 characters) for all languages except messaging and voice over IP service was developed by
Chinese, Japanese, and Korean. two brothers Nikolai Durov and Pavel Durov. Written in
C++, it was initially released in August 2013 under GNU
473. Instagram was originally developed by: GPL License. The company Telegram LLC is based in
A. Tim Berners Lee
London.
B. Mark Zuckerberg
C. Kevin Systrom and Mike Krieger 477. Facebook was first launched in the year __.
D. Andrew McCollum and Dustin Moskovitz A. 2003
B. 2004
Answer: C (Kevin Systrom and Mike Krieger) C. 2005
D. 2006
Notes: Instagram is a photo and video-sharing social
networking service owned by Facebook, Inc. It was Answer: B (2004)
created by Kevin Systrom and Mike Krieger, and
launched in October 2010. In April 2012, Facebook Notes: Facebook is a California based social networking
acquired Instagram. service company. It was developed by Mark
Zuckerberg and his friends and first launched in
474. ‘Instagram’ is acquired by __. February 2004.
A. Whatsapp
B. Yahoo 478. Arrange the following social networking tools
C. Facebook according to their year of launching in ascending
D. Google order:
a) Twitter
Answer: C (Facebook)
b) Facebook
c) LinkdIn
d) Pinterest
A. (d), (c), (b) and (a)
155 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

B. (c), (a), (d), and (b) a) Research Gate


C. (c), (b), (a) and (d) b) DRUPAL
D. (d), (a), (b) and (c) c) Academia.edu
d) JOOMLA
Answer: C
A. c, and d are correct
Notes: LinkedIn (2003); Facebook (2004); Twitter
B. a, and c are correct
(2006); Pinterest (2010).
Library Info

Library Info
C. b and c are correct
479. Reid Hoffman is related to the development of D. b and d are correct
which among the following:
Answer: B
A. Facebook
B. Linkedin Notes: Academia.edu is a commercial social
C. MySpace networking website for academics. The platform can be
D. Tumblr used to share papers, monitor their impact, and follow
Answer: B (Linkedin) the research in a particular field. It was founded by
Richard Price and first launched in September 2008.
Notes: Linkedin was founded on December 28, 2002,
Research Gate is a European commercial Academic
and launched on May 5, 2003 by Reid Hoffman and his
friends. It is mainly used for professional networking. Social Networking site for scientists and researchers,
established in 2008 and headquartered in Berlin,
480. MySpace was founded in __. Germany.
A. 2002
B. 2003 483. R G Score is an integral feature of __.
C. 2004 A. Google Scholar
D. 2005 B. Scitation
C. ResearchGate
Answer: B (2003) D. Medline

Notes: MySpace is a California based Social Answer: C (ResearchGate)


Networking website founded in 2003.
Notes: The RG Score (ResearchGate Score) measures
481. Select the correct combinations: scientific reputation based on how your work is received
a) Google Scholar – Academic Search Engine by your peers after listing on ResearchGate.
b) Amazon – Book acquisition
484. Academia and ResearchGate are __.
c) LIS-Forum – Mailing list for library
professionals A. Reference Management Tools
d) Worldcat – Bibliographic database B. Academic Social Networking Sites
C. Crowdfunding sites
A. c, and d are correct
D. Open-source softwares
B. a, and c are correct
C. b and c are correct Answer: B (Academic Social Networking Sites)
D. a, b, c, and d are correct
Notes: Academia is an American commercial social
Answer: D networking website for academics, founded by Richard
482. Which of the following are academic social Price in 2008.
network? 485. Mendeley and ResearchGate are examples of __.
156 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

A. Indexing Databases a) Intelligent web


B. Bookmarking Networks b) Facebook
C. Academic Social Networks c) Skype
D. None of the above d) Twitter

Answer: C (Academic Social Networks) A. c, and d are correct


B. a, and c are correct
486. ResearchGate - an academic social networking
Library Info

Library Info
site was first launched in __. C. b and c are correct
A. 2006 D. b and d are correct
B. 2008 Answer: B
C. 2010
D. 2011 490. The term ‘Crowdsourcing’ was coined by __.
A. Bertram Gross
Answer: B (2008) B. Jeff Howe
Notes: ResearchGate is an academic social C. Larry Sanger
networking site for scientists and researchers to share D. Jeff Bezos
papers, ask and answer questions, and find collaborators. Answer: B (Jeff Howe)
It was first launched in 2008 by Ijad Madisch.
Notes: Crowdsourcing is a sourcing model in which
487. Oovoo is a __. individuals or organizations obtain goods or services,
A. Video Networking site including ideas, voting, micro-tasks and finances, from a
B. Social Networking site large, relatively open group of participants.
C. Academic Networking site Crowdsourcing is the practice of engaging a ‘crowd’
D. Photo Networking site or group for a common goal — often innovation,
problem solving, or efficiency with the help of new
Answer: A (Video Networking site)
technologies, social media and web 2.0. Jeff Howe, a
Notes: ooVoo was a video chat and a messaging app contributing writer and editor for Wired Magazine, was
developed by ooVoo LLC and owned by Krush the first to coin the term “crowdsourcing” in a 2006
Technologies, LLC. The original Microsoft Windows article entitled “The Rise of Crowdsourcing.”
app was released in 2007. Crowdsourcing is used in libraries for OCR corrections
on digitized texts, for tagging and for funding, especially
488. Flickr is a ___. in the absence of financial and human means.
A. Audio Networking site
B. Social Networking site 491. A crowdsourcing system, where users are
C. Academic Networking site willingly contributing to a task, is called:
D. Photo Networking site A. Implicit
B. Third Party
Answer: D (Photo Networking Site) C. Explicit
D. Tacit
Notes: Flickr is an image and video hosting service. It
was created by Ludicorp in 2004 and now owned by Answer: C (Explicit)
SmugMug since April 2018.
Notes: Crowdsourcing can be done in two ways: In
489. Which of the following are NOT social Explicit crowdsourcing, users willingly work together
networking tools? to evaluate, share and build different specific tasks,
157 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

while in implicit crowdsourcing, the users solve a 496. Trove Australian newspaper digitization project
problem as a side effect of something else they are of the National Library of Australia is an example
doing, means they are not aware of their contribution. of __.
A. Crowdsourcing
492. Wikipedia is an example of __. B. Newspaper Clipping Service
A. Crowdsourcing C. World Memory Project
B. Crowdfunding D. Crowdfunding
C. Crowdvoting
Library Info

Library Info
D. Both Crowdsourcing & Crowdfunding Answer: A (Crowdsourcing)

Answer: D (Both Crowdsourcing & Crowdfunding) 497. CrowdAsk is a modernized version of which of
the following library service?
493. Which one of the following is NOT a benefit of A. Document delivery
‘Crowdsourcing’? B. Membership
A. Cost-efficiency C. Inter-Library Loan
B. The tapping of huge talent in the form of D. Reference Service
crowd
C. Intellectual property leakage Answer: D (Reference Service)
D. No geographical boundaries limitations
Notes: Crowdask is a crowdsourcing web-based help
Answer: C (Intellectual property leakage) system developed by the librarians Ilana Stonebraker
and Tao Zhang at Purdue Univery Library System
494. Who is the creator of the Rupee symbol, which allows users (particularly undergraduates) to ask
designed through ‘Crowdsourcing’? and answer questions related to library resources and
A. Anant Khasbardar services.
B. Udaya Kumar
C. Bhagyasri Sheth 498. Which among the following is a Crowdfunding
D. V. Sunil platform in India?
A. Fueladream
Answer: B (Udaya Kumar) B. Ketto
Notes: Designed by Udaya Kumar, Indian Rupee C. Milaap
symbol was presented to the public by the Government D. All the above
of India on 15 July 2010 after selecting in an open Answer: D (All the above)
competition as a crowdsourcing model.
Notes: Crowdfunding is the practice of raising
495. Libcrowds is a ‘Crowdsourcing’ initiative of __. funds/money from a large number of people with the use
A. Library of Congress of Internet and social media.
B. British Library
C. UNICEF Ketto: Founded in December 2012 by Varun Sheth,
D. National Library of India Kunal Kapoor and Zaheer Adenwala. Ketto is an
Online Crowdfunding Platform and Website in India for
Answer: B (British Library) fundraising of Social, Charity, Personal and Creative
causes. It is headquartered in Mumbai.
Notes: LibCrowds is a platform for hosting experimental
crowdsourcing projects aimed at improving access to the Milaap: Founded in 2010 and headquartered in
diverse collections held at the British Library. Bangalore, Milaap is an online crowdfunding platform

158 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII

that enables anyone across India to raise funds for Answer: A (Velocity)
healthcare, education, sports, disaster relief and other
personal causes. Notes: In the year 2001, Doug Laney came out with 3
V’s, namely Volume, Velocity and
Fueladream: Founded in 2016 and headquartered in Variety. Then Veracity got added, making it 4 V’s.
Bangalore, Fueladream is a crowfunding platform aims Then Value got added, making it 5V’s. (i) Volume –
to raise funds for creative ideas, causes, charities, events refers to the size of big data. Data can be considered Big
and community led activities with a initial focus on Data or not is based on the volume. (ii) Velocity – refers
Library Info

Library Info
India. to the speed at which the data is getting
accumulated. (iii) Variety – refers to Structured, Semi-
Wishberry: Founded in 2009 and headquartered in structured and Unstructured data due to different
Mumbai, Wishberry is a crowdfunding platform for sources of data generated either by humans or by
creative artists in India. machines. (iv) Veracity - refers to the assurance of
499. Which among these is an activity to generate quality/integrity/credibility/accuracy of the data. Since
new ideas? the data is collected from multiple sources, we need to
A. Crowdstorming check the data for accuracy before using it for business
B. Crowdcollaboration insights. (v) Value - refers to how useful the data is in
C. Crowdopinion decision making. We need to extract the value of the Big
D. Crowdvoting Data using proper analytics.

Answer: A (Crowdstorming) 502. In how many forms Big data can be found?
A. 2
Big Data & Data Mining B. 3
C. 4
500. The large volumes of high velocity, complex D. 5
and variable data are termed as:
A. Big data Answer: B (3)
B. Linked data Notes: Big Data could be found in three forms:
C. Semantic data Structured, Unstructured and Semi-structured.
D. Ontology-based data
503. Select the odd one out from the following big
Answer: A (Big data) data technologies?
Notes: Big data is an evolving term that describes A. Apache Hadoop
a large volume of structured, semi-structured and B. Apache Kafka
unstructured data that has the potential to be mined for C. Apache Spark
information and used in machine learning projects and D. Apache Pytarch
other advanced analytics applications. Answer: D (Apache Pytarch)
501. In 2001, Industry analyst Doug Laney said that 504. Apache Kafka is originally developed by __.
the big data consists of three categories. These are A. LinkedIn
Volume, Variety, and ___. B. Facebook
A. Velocity C. Google
B. Value D. IBM
C. Variety
D. Veracity Answer: A (LinkedIn)
159 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

Notes: Apache Kafka was originally created by C. Lack of Infrastructure


LinkedIn in the year 2011. Apache Kafka is a distributed D. All of the above
data streaming platform that can publish, subscribe to,
store, and process streams of records in real time. It is Answer: D (All the above)
designed to handle data streams from multiple sources 509. Hadoop – a software framework for storage and
and deliver them to multiple consumers. It is now being processing of very large data sets are developed
developed and maintained by Apache Software by __.
Library Info

Library Info
Foundation. A. Apache Software Foundation
505. Which among the following are the B. IBM
characteristics of Big data? C. Microsoft Corporation
a) Volume D. NISO
b) Variety Answer: A (Apache Software Foundation)
c) Velocity
d) Veracity Notes: Apache Hadoop first released in April 2006 is
A. a, b, and d are correct an open source software framework for distributed
B. b and c are correct storage and processing of big data using the
C. b, c and d are correct MapReduce programming model. Hadoop is released
D. All are correct under Apache License 2.0.

Answer: D (All are correct) 510. Who among the following is associated with the
development of Hadoop?
Notes: The five V's of Big Data are: Velocity, Volume,
A. Doug Cutting
Value, Variety, and Veracity.
B. Mike Cafarella
506. Which ‘‘V’’ of Big Data is concerned with the C. Both A & B
usefulness of data? D. None of the above
A. Velocity
Answer: C (Both A & B)
B. Variety
C. Veracity Notes: Hadoop was developed by Doug
D. Value Cutting and Mike Cafarella while working on Apache
Nutch project.
Answer: D (Value)
511. What are the main components of Hadoop?
507. In big data environment, the data, consisting
A. MapReduce
origin, authenticity, trustworthiness, completeness
B. HDFS
and integrity, is called: C. YARN
A. Variety D. All the above
B. Volume
C. Velocity Answer: D (All the above)
D. Veracity
Notes: Apache Hadoop is an open source, Java-based
Answer: D (Veracity) software platform that manages data processing and
storage for big data applications. In other words, Hadoop
508. In big data analysis, the barriers include: is a framework that uses distributed storage and parallel
A. Data Privacy processing to store and manage big data. There are three
B. Storage Capacity
components of Hadoop: (i) Hadoop HDFS - Hadoop
160 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

Distributed File System (HDFS) is the storage unit. (ii) A. Data Mining is defined as the procedure of
Hadoop MapReduce - Hadoop MapReduce is the extracting information from huge sets of
processing unit. (iii) Hadoop YARN - Hadoop YARN data
(Yet Another Resource Negotiator) is a resource B. Data mining also involves other processes
management unit that provides resources for the such as Data Cleaning, Data Integration,
processes running on Hadoop. Data Transformation
C. Data mining is the procedure of mining
512. Data in __ bytes size is called big data.
Library Info

Library Info
knowledge from data
A. Tera D. All of the above
B. Giga
C. Peta Answer: D (All of the above)
D. Meta
Notes: Data Mining is defined as extracting information
Answer: C (Peta) from huge sets of data. In other words, we can say that
data mining is the procedure of mining knowledge from
Notes: Data in Peta bytes i.e. 10^15 byte size is called data. The information or knowledge extracted so that it
Big Data. can be used.
513. Who among the following has the world’s 516. Which among the following are common tasks
largest Hadoop clusters? involved in data mining process?
A. Facebook a) Anomaly detection
B. Datamatics b) Clustering
C. Apple c) Classification
D. Google d) Summarization
Answer: A (Facebook) A. a, b, and d are correct
B. a, c and d are correct
Notes: Facebook has many Hadoop clusters, the largest C. a b, and c are correct
among them is the one that is used for Data D. All are correct
warehousing.
Answer: D (All are correct)
514. Data mining is ___.
Notes: Data mining involves six common classes of
A. A technique for searching large scale databases
B. A database used for reporting tasks: (i) Anomaly detection (ii) Association Rule
C. A repository of an organization’s stored data Learning (iii) Clustering (iv) Classification (v)
D. The process of designing, building and Regression, and (vi) Summarization.
maintaining an organization’s database 517. How many categories of functions involved in
Answer: A (A technique for searching large scale Data Mining?
database) A. 2
B. 3
Notes: Data mining can be described as ‘specific C. 4
analytic technique that examining large preexisting D. 5
databases in order to generate new information’.
Answer: A (2)
515. What is true about data mining?
Notes: There are two categories of functions involved in
Data Mining: (i) Descriptive Mining – It provides
161 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

general properties of the data, or exhibit the common ecological and environmental sciences produced by
features of the data available in the database or data scientists.
collections. For example, Count, average etc. (ii)
Predictive Mining - This helps in understanding the 521. Bibexcel is developed by __.
characteristics that are not explicitly available. Predictive A. Olle Persson
mining predicts or make inference on the current data in B. Chris Argyris
order to make prediction. For instance, the prediction of C. Vroom
D. Frederick Herzberg
Library Info

Library Info
business analysis in the next quarter with the
performance of the previous quarters. Answer: A (Olle Persson)
518. Identify the key salient traits of soft data: Notes: BibExcel is designed to assist a user
a) Human intelligence in analyzing bibliographic data, or any data of a textual
b) Certain and definite nature formatted in a similar manner. The idea is to
c) Opinions and contradictions generate data files that can be imported to Excel, or any
d) No scope for constructive criticisms program that takes tabbed data records, for further
A. a, and c are correct processing.
B. c, b and d are correct
C. c, and d are correct
D. c, a and b are correct

Answer: A

519. What is KDD in data mining?


A. Knowledge Discovery Database
B. Knowledge Discovery Data
C. Knowledge Data Definition
D. Knowledge Data House

Answer: A (Knowledge Discovery Database)

Notes: The term KDD (Knowledge Discovery Database)


refers to a broad process of discovering the knowledge
in the data.

520. DataOne Stands for __.


A. Data on Neuron Engineering
B. Data on Network Encoding
C. Data Observation Network on Earth
D. Data on Networking Engineering

Answer: C (Data Observation Network on Earth)

Notes: DataONE is a federated data network that is


being developed to improve access to, and preserve data
about life on Earth and the environment that sustains
it. DataONE's goal is to preserve and provide access to
multi-scale, multi-discipline, and multi-national data on
162 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII
Library Info

Library Info
Assertion
&
Reasoning

163 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII

1. Assertion (A): It is not economical to store and 4. Statement (A): ‘E-Granthalaya’ can be
read video data from secondary storage devices customized depending upon the requirement of
Reason (R): Video data requires enormous disk individual library
storage as image compression ratio is high Statement (B): ‘E-Granthalaya’ is freely
available software
A. (A) is true, but (R) is false
B. (A) is false, but (R) is true A. (A) is true, but (B) is false
Library Info

Library Info
C. Both (A) and (R) are true B. (A) is false, but (B) is true
D. Both (A) and (R) are false C. Both (A) and (B) are true
D. Both (A) and (B) are false
Answer: B
Answer: B
2. Assertion (A): In recent years, QR codes have
become ubiquitous and may replace the use of 5. Assertion (A): System analysis identifies the
barcodes. components and flow of work.
Reason (R): QR is a two-dimentional code with Reason (R): System analysis is not necessary if
large capacity for storage. These codes hold library is automated.
information both horizontally and vertically and
can be scanned by users with their smart phones A. (A) is true, but (R) is false
at ease. B. (A) is false, but (R) is true
C. Both (A) and (R) are true
A. (A) is true, but (R) is false D. Both (A) and (R) are false
B. (A) is false, but (R) is true
C. Both (A) and (R) are true Answer: A
D. Both (A) and (R) are false 6. Assertion (A): Publishing in institutional
Answer: B repositories is the green route of open access.
Reason (R): Depositing in institutional
3. Assertion (A): ‘Web Assembly’, a standard that repositories restricts access to scholars of
enables applications to run securely in browsers respective institute.
(without the use of Plug-ins) is a people-friendly
application in using web. A. (A) is true, but (R) is false
Reason (R): A web language transforms the B. (A) is false, but (R) is true
way people use their devices and the web C. Both (A) and (R) are true
making applications are more accessible to D. Both (A) and (R) are false
people at ease all over the globe.
Answer: A
A. (A) is true, but (R) is false 7. Assertion (A): In the digital environment, the
B. (A) is false, but (R) is true users expect from the library the ability to
C. Both (A) and (R) are true connect broad range of information resources in
D. Both (A) and (R) are false a variety of formats with a single point access.
Answer: C Reason (R): Libraries already have much of
what is required in the digital environment.

A. (A) is true, but (R) is false

164 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII

B. (A) is false, but (R) is true 11. Assertion (A): Digitization has proved to be
C. Both (A) and (R) are true possible for every format and medium held by
D. Both (A) and (R) are false library.
Reason (R): All libraries are making their text
Answer: A and visual collections digitized.
8. Assertion (A) : Semantic web is an extension of
A. (A) is true, but (R) is false
www in which web contents cannot be
Library Info

Library Info
expressed in natural language. B. (A) is false, but (R) is true
Reason (R) : Semantic web can be easily C. Both (A) and (R) are true
associated with spider web. D. Both (A) and (R) are false
A. (A) is true, but (R) is false Answer: A
B. (A) is false, but (R) is true
C. Both (A) and (R) are true 12. Assertion (A): Use of microfilming is becoming
D. Both (A) and (R) are false obsolete day by day.
Reason (R): ICT has developed digital
Answer: D technologies, which are quick, cheap and easy to
9. Assertion (A) : RFID technology is still not handle.
widely installed in Indian Library Environment.
A. (A) is true, but (R) is false
Reason (R) : the standardization, application
and innovation are constantly changing. B. (A) is false, but (R) is true
C. Both (A) and (R) are true
D. Both (A) and (R) are false
A. (A) is true, but (R) is false
B. (A) is false, but (R) is true Answer: C
C. Both (A) and (R) are true and (R) is the
correct explanation of (A) 13. Assertion (A) : Deacidification is a measure to
D. Both (A) and (R) are true, but (R) is not preserve documents in any medium.
the correct explanation of (A) Reason (R) : Digital preservation needs a
different preservation care.
Answer: D

10. Assertion (A) : Modern Integrated Library A. (A) is true, but (R) is false
Management Softwares offer user friendly B. (A) is false, but (R) is true
Graphical User Interfaces (GUI) on the web. C. Both (A) and (R) are true
Reason (R) : Almost every module of modern D. Both (A) and (R) are false
Integrated Library Management Software is Answer: B
accessible through the internet.
14. Assertion (A): Library automation is at a slow
A. (A) is true, but (R) is false pace in Indian Libraries.
B. (A) is false, but (R) is true Reason (R): Lack of U.G.C. (India) support
C. Both (A) and (R) are true lead to this situation.
D. Both (A) and (R) are false
A. (A) is true, but (R) is false
Answer: C B. (A) is false, but (R) is true
C. Both (A) and (R) are true

165 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII

D. Both (A) and (R) are false 18. Assertion (A): Students are among the most
prolific users of social network sites (SNS).
Answer: A Reason (R): Social network sites always help in
15. Assertion (A): The development of Institutional fulfilling their academic information needs.
Repositories in India is at a slow pace. A. (A) is true, but (R) is false
B. (A) is false, but (R) is true
Reason (R): This can be attributed to the non-
C. Both (A) and (R) are true
availability of open source software and lack of
Library Info

Library Info
interest among the LIS professionals. D. Both (A) and (R) are false

Answer: A
A. (A) is true, but (R) is partially true
B. (A) is false, but (R) is true 19. Assertion (A): Many projects and initiatives are
C. Both (A) and (R) are true taken to create digital libraries.
D. Both (A) and (R) are false Reason (R): Digital library improves the
professional status of librarians.
Answer: A

16. Assertion (A): Making information available A. (A) is true, but (R) is false
using GSDL is effective than just putting it on B. (A) is false, but (R) is true
C. Both (A) and (R) are true
the web.
D. Both (A) and (R) are false
Reason (R): The information available in digital
form can be archived. Answer: A

A. (A) is true, but (R) is false 20. Assertion (A) : Information, not data, is the
B. (A) is false, but (R) is true fundamental fuel of the current Big Data
C. Both (A) and (R) are true and (R) is the Phenomenon.
correct explanation Reason (R) : The reason behind the quick
D. Both (A) and (R) are true, but (R) is not expansion of Big Data is the extensive degree to
the correct explanation which data are created, shared and utilised in
recent times.
Answer: D
A. (A) is true, but (R) is false
17. Assertion (A) : Present day libraries need to
B. (A) is false, but (R) is true
develop social networking tools for their library
websites. C. Both (A) and (R) are true
Reason (R) : It helps to reach out the patrons D. Both (A) and (R) are false
where they live and provide service at the point Answer: C
of need.
21. Assertion (A): Big data is a product of data
A. (A) is true, but (R) is false being generated constantly, automatically, and
B. (A) is false, but (R) is true rapidly.
C. Both (A) and (R) are true Reason (R): Due to the omnipresence of
D. Both (A) and (R) are false personal computing devices and smart phones,
individuals generate massive amount of data
Answer: C through e-commerce, e-communication, social
media, online searches and GPS navigation.

166 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII

A. (A) is true, but (R) is false 25. Assertion (A) : Commercial Library
B. (A) is false, but (R) is true Management Softwares need to be discouraged
C. Both (A) and (R) are true in libraries to make the contemporary librarians
D. Both (A) and (R) are false free from the dictate of commercial vendors.
Reason (R) : Open source softwares (OSS) are
Answer: C more flexible and are free from much recurring
expenditure and wider user base of OSS helps in
22. Assertion (A) : Preprint archives, such as arxiv
Library Info

Library Info
and SSRN rapidly achieved prominence in the problem solving better.
field of scholarly communication. A. (A) is true, but (R) is false
Reason (R) : These archives contain Preprint B. (A) is false, but (R) is true
C. Both (A) and (R) are true
along with DOI.
D. Both (A) and (R) are false
A. (A) is true, but (R) is false Answer: C
B. (A) is false, but (R) is true
C. Both (A) and (R) are true 26. Assertion (A) : Digitization of documents is the
D. Both (A) and (R) are false most viable method for long-term preservation.
Reason (R) : Digital preservation ensures the
Answer: A accessibility and usability of documents forever.
23. Assertion (A) : Inclusion of DOAJ implies the
quality of an open access journals. A. (A) is true, but (R) is false
Reason (R) : DOAJ is an online directory that B. (A) is false, but (R) is true
C. Both (A) and (R) are true
indexes and provides access to open access and
D. Both (A) and (R) are false
peer viewed journals. Besides DOAJ has
tightened the listing criteria. Answer: A

A. (A) is true, but (R) is false 27. Assertion (A) : RDA is not a ‘content’ standard.
B. (A) is false, but (R) is true Reason (R) : RDA data are being used as the
C. Both (A) and (R) are true basis for a meta data element set.
D. Both (A) and (R) are false A. (A) is true, but (R) is false
B. (A) is false, but (R) is true
Answer: C C. Both (A) and (R) are true
24. Assertion (A) : In Gold Open Access, costs are D. Both (A) and (R) are false
not transferred to authors. Answer: B
Reason (R) : Gold Open Access journals
publish peer-reviewed articles without paid 28. Assertion (A): Web 1.0 is 'Read only web'.
subscription barriers for their readers. Statement (B): 'Skype' is an example of Web
1.0.
A. (A) is true, but (R) is false A. (A) is true, but (B) is false
B. (A) is false, but (R) is true B. (A) is false, but (B) is true
C. Both (A) and (R) are true C. Both (A) and (B) are true
D. Both (A) and (R) are false D. Both (A) and (B) are false

Answer: B Answer: A

167 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII

29. Assertion (A): Social networking tools are 33. Statement (A): The iPod, first version released
effective for marketing of library products and in 2001, is a portable media player and smaller
services. in size as compared to iPad.
Reason (R): They help to reach out users Statement (B): The iPad, first version released
anywhere and at any time. in 2010 is a tablet computing device, much
A. (A) is true, but (B) is false bigger in size as compared to iPod.
B. (A) is false, but (B) is true A. (A) is true, but (B) is false
Library Info

Library Info
C. Both (A) and (B) are true B. (A) is false, but (B) is true
D. Both (A) and (B) are false C. Both (A) and (B) are true
D. Both (A) and (B) are false
Answer: C

30. Assertion (A): Search engines search Answer: C


documents for specified key-words, and returns
a list of documents where the keywords were 34. Statement (A): Microblogging is a web service
found. that allows the subscriber to broadcast short
Reason (R): Spider helps the search engines to messages to other subscribers of the service.
index the documents. Statement (B): Twitter and Tumblr are example
A. (A) is true, but (R) is false of Microblogging service.
B. (A) is false, but (R) is true A. (A) is true, but (B) is false
C. Both (A) and (R) are true B. (A) is false, but (B) is true
D. Both (A) and (R) are false C. Both (A) and (B) are true
D. Both (A) and (B) are false
Answer: C

31. Assertion (A): Work about Big data could also Answer: C
be found in Library.
Reason (R): Library data needs to be 35. Statement (A): Shibboleth is a single sign-
transformed into information or knowledge. on log-in system for computer networks and
A. (A) is true, but (R) is false the Internet based on Security Assertion Markup
B. (A) is false, but (R) is true Language (SAML).
C. Both (A) and (R) are true Statement (B): Shibboleth is used by INFED
D. Both (A) and (R) are false (INFLIBNET Access Management Federation)
to facilitate remote login and access to e-
Answer: C resources.
32. Assertion (A): Cloud computing does not A. (A) is true, but (B) is false
facilitate external collaboration. B. (A) is false, but (B) is true
Reason (R): Cloud computing causes libraries C. Both (A) and (B) are true
to provide innovative web services for users. D. Both (A) and (B) are false
A. (A) is true, but (R) is false
B. (A) is false, but (R) is true Answer: C
C. Both (A) and (R) are true
D. Both (A) and (R) are false 36. Statement (A): Link Resolver is a software
application based on OpenURL protocol
Answer: B developed by Alan Harvey Guth.

168 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII

Statement (B): Link Resolver helps to


provide seamless access to electronic full-text
content across all databases and vendors for a
desired citation.
A. (A) is true, but (B) is false
B. (A) is false, but (B) is true
C. Both (A) and (B) are true
D. Both (A) and (B) are false
Library Info

Library Info
Answer: B

Notes: Link Resolver is a software application based


on OpenURL protocol developed by Herbert Van de
Sompel.

169 AQUIL AHMED

You might also like