LIS MCQ MH SET 2020 Solved Proven 4 Welcome to your LIS MCQ MH SET 2020 Solved Proven 4To Start Quiz Click on Next Button Which is below this Message. I hope you learn something new with enjoyment. 1. In PERT and CPM Flow Diagram are known as the techniques of ......? Work analysis Leadership Survey Communication None 2. X Theory and Y Theory were propounded by __. F. W. Taylor Abraham Maslow Peter Drucker Douglas McGregor None 3. Edward Deming was __. a Chinese professor an American professor a Japanese professor a British professor None 4. In an organization's System Inserting spurious data or information to disrupt or overload service is called Interruption Interception Modification Fabrication None 5. Assertion: ReasonAssertion (A): Social networking tools are effective for marketing of library products and services.Reason (R): They help to reach out users anywhere and at any time. Both (A) and (R) are true Both (A) and (R) are false (A) is true and (R) is false (A) is false and (R) is true None 6. Arrange the following measures according to their Bytes contained in them:(a) Exabyte(b) Yottabyte(c) Zettabyte(d) Petabyte (a), (b), (c) and (d) (c), (a), (b) and (d) (d), (a), (c) and (b) (a), (c), (c) and (d) None 7. Arrange the following steps in programming in a proper logical sequence:(a) Program code(b) Program documentation(c) Program test(d) Program design (a), (b), (c) and (d) (b), (a), (c) and (d) (d), (a), (c) and (b) (c), (a), (b) and (d) None 8. Match the following:(a) Fumigation - (i) Acquisition(b) Buidling library collection - (ii) Preservation(c) Kardex system - (iii) Reference service(d) Information desk (iv) Recording of periodicals (a) -(iv), (b)-(iii), (c)-(ii), (d)-(i) (a)-(iii), (b)-(i), (c)-(iv), (d)-(ii) (a) -(iv), (b)-(iii), (c)-(i), (d)-(ii) (a) -(ii), (b)-(i), (c)-(iv), (d)-(iii) None 9. Assertion: ReasonAssertion (A): There is no difference between information management and knowledge management. Reason (R): Information and knowledge are sometimes used synonymously. (A) is true but (R) is false (A) is false but (R) is true Both (A) and (R) are true Both (A) and (R) are false None 10. Assertion: ReasonAssertion (A): RDA is a new content standard for cataloging and replaces AACR2. Reason(R): AACR2 is not a content standard. (A) is true but (R) is false (A) is false but (R) is true Both (A) and (R) are true Both (A) and (R) are false None 11. In following facets Which are associated with the session layer?(a) Diaglog control(b) Token management(c) Semantics of the information transmitted (d) Synchronization a, b, and d are correct a, c and d are correct a and c are correct c and d are correct None 12. An attempt to make computer resources unavailable to its intended user is called Virus attack Worm attack Denial-of-Service Attack Botnet process None 13. In the OSI reference model which layers are host to host layers?(a) Transport layer(b) Network layer(c) Session layer(d) Data Link Layer (a) and (b) are correct (b) and (c) are correct (a) and (c) are correct (b) and (d) are correct None 14. In following Program which is used to control system performance is classified as __. Experimental program System program Specialized program Organized program None 15. . LOCKSS is an initiative of which university ? MIT university Stanford university University of Waikato University of Southampton None 16. Which ‘‘V’’ of Big Data is concerned with the usefulness of data ? Velocity Variety Veracity Value None 17. Position Detection pattern are arranged at __ corners of the QR code. 1 2 3 4 None 18. the international standard ISO/IEC 18004 : 2000 is developing ....... QR code Biometric )MARC Bibliographic record None 19. Assertion : ReasonAssertion (A): A proxy server does not act as an intermediary between a computer and the internet. Reason (R): Proxy server ensures security, administrative control, and cache. (A) is true but (R) is false (A) is false but (R) is true Both (A) and (R) are true Both (A) and (R) are false None 20. Assertion: ReasonAssertion (A): Search engines search documents for specified key-words, and returns a list of documents where the keywords were found. Reason (R): Spider helps the search engines to index the documents (A) is true but (R) is false A) is false but (R) is true Both (A) and (R) are true Both (A) and (R) are false None 1 out of 10 Please fill in the comment box below. Time's upNo related posts.