UGC NET June 2019 Paper 2 Library Science (21-30)

1. Identify the penalty in case of plagiarism at 'Level 2' in Academic and Research Publications as per UGC (Promotion of Academic Integrity and Prevention of Plagiarism in Higher Education Institutions) Regulation, 2018 :
(1) No penalty
(2) Shall be denied a right to one annual increment
(3) Shall be denied a right to two successive annual increments
(4) Shall be denied a right to three successive annual increments

2. Which of the following Public Library Acts does NOT have the provision of Library Cess?
(a) Kerala
(b) Karnataka
(c) West Bengal
(d) Maharashtra

(1) (c) and (d)
(2) (b) and (d)
(3) (a) and (b)
(4) (a) and (c)

3.Match List-I with List-II
List I List II
(a) Independent variable (i) Change variable
(b) Dependent variable (ii) Outcome/effect variable
(c) Extraneous variable (iii) Confounding variable
(d) Intervening variable (iv) Affecting cause and effect relationship
(1) (ii) (i) (iv) (iii)
(2) (i) (ii) (iv) (iii)
(3) (iii) (iv) (i) (ii)
(4) (iv) (iii) (ii) (i)

4. Match List-I with List-II:
List I List II
(a) Cost effectiveness (i) Cost of product/service rendered by organisation
(b) Cost-benefit analysis (ii) Determined by dividing the allotted cost of subsystem by its actual number of operations
(c) Cost analysis (iii) Relationship between the benefits of product/ service and cost of providing it
(d) Unit cost (iv) Relationship between level of performance and the cost involved in achieving the level
(1) (iv) (iii) (i) (ii)
(2) (i) (ii) (iv) (iii)
(3) (ii) (iii) (iv) (i)
(4) (iii) (iv) (ii) (i)

5. Who among the following have developed the initial version of SPSS?
(a) Norman Nie
(b) C. Hadlai Hull
(c) Dale H. Bont
(d) John Chambers

(1) (b), (c) and (d)
(2) (a), (b) and (c)
(3) (a), (b) and (d)
(4) (a), (c) and (d)

6.Match List-I with List-II :
List I List II
(a) Repeaters (i) Allows similar networks to communicate
(b) Gateways (ii) Allows data to be transferred within the networks
(c) Routers (iii) Help in strengthening the signals
(d) Switches (iv) Allows dissimilar networks to communicate
(1) ii iii iv i
(2) iv iii ii i
(3) iii iv i ii
(4) iii i iv ii

7. Match List-I with List-II :
Class of IP Supporting coverage
(a) Class A IP (i) Supports small networks with fewer than 256 devices
(b) Class B IP (ii) Reserved for multicast groups
(c) Class C IP (iii) Supports large networks with many devices
(d) Class D IP (iv) Supports medium-sized networks
(1) ii i iv iii
(2) ii i iii iv
(3) iii iv ii i
(4) iii iv i ii

8. Which of the following are included in the process of Big 6 Model of Information Problem Solving Skills advocated by Carrie A. Lowe and Michael B. Eisenberg?
(a) Task definition, information seeking strategies, location and address
(b) Survey, feedback and compliance
(c) Use of information, synthesis, evaluation
(d) Analysing, prioritizing, reporting

(1) (a) and (b) are correct
(2) (b) and (d) are correct
(3) (a) and (c) are correct
(4) (c) and (d) are correct

9.The protocol used to provide security to e-mails is known as
(1) POP
(2) PGP
(3) SNMP
(4) SSL, TLS, and STARTTLS

10.Which is NOT the part of Maslow's hierarchy of need?
(1) Esteem need
(2) Basic need
(3) Security need
(4) Psycho-physical need

Click Here For Points Try Again

Next Post Previous Post