Library Science MCQ Quiz - Objective Question with Answer for Library Science - Download Free PDF
Last updated on Jun 20, 2025
Latest Library Science MCQ Objective Questions
Library Science Question 1:
"Netflix is for watching" is equivalent to which law of library science?
Answer (Detailed Solution Below)
Library Science Question 1 Detailed Solution
The correct answer is 1st law:
Key Points
- Netflix is to watch is equivalent to the first law of library science "Books are for use" in the sense that books should be read likewise Netflix is to be used and watched for entertainment.
- 1st Law of Library Science
- First Law: Books are for Use
- Implications of the first law are.
- Library Location
- Working Hours
- Library Building and FurnitureStaff
- 2nd Law:
- The second law is “Every reader his/her book is the variant form of which is “books for all
- In this Law, Every ready means all types of users of the library irrespective of sex, caste, and physical appearance.
- Implications of the second law are
- The obligation of the State
- Obligations of the Library Authority.
- 3rd law:
- Third Law: Every Book its Reader. The approach of this law is oriented toward the book. As per the law, every book in a library should have a chance of finding its appropriate reader and be useful to her/him.
- The third law implicitly means that “resources look for users.in fact, the duty of the librarian is to help the library resources find the people who want and need them most.
- This principle naturally addresses the fundamental issue of open access.
- A book misplaced is a book lost forever is the principle of the 3rd law on the reader's side.
- The third law also advocates the maintenance of a well-designed library catalog
- 4th law:
- Fourth Law: Save the Time of the Reader, presents the biggest challenge to the library administrator. Policies must always be formulated keeping in view the needs of the readers (users) in mind.
- Implications of 4th law are;
- open access system
- Proper classification system
- Effective circulation systems with all recently developed methods and techniques like photo-charging systems, ticket systems, computerized charging systems, barcode systems, and radio frequency identification (RFID) systems
- 5th law:
- Fifth Law: Library is a Growing Organism: Dr. Ranganathan compares the library to a growing organism. In a living organism, the growth is of two kinds: the child's growth and the adult's growth.
- Implications:
- Book Stock
- Classification and the Catalogue;
- Weeding of Books
Library Science Question 2:
Which symptom represents a program that appears legitimate, but performs some illicit activity when it is run?
Answer (Detailed Solution Below)
Library Science Question 2 Detailed Solution
The correct is Trojan
Key Points
- A Trojan, named after the historical "Trojan horse," is a type of malicious software that disguises itself as a standard, trusted program. Users are often tricked into loading and executing Trojans on their systems because they appear to be useful or interesting software.
- Unlike computer viruses and worms, Trojans are not able to replicate themselves, but once installed, they can deliver their payload.
- This payload can range from stealing sensitive data (such as credit card information or personal identification) to taking over the computer's system resources to use them for illegal activities (like participating in a Distributed Denial of Service attack).
- So, Trojans represent programs that look legitimate and harmless at first glance (this could be software updates, email attachments, or download links), but when they are run or installed, they perform illicit activities secretly, doing harm to user data, privacy, or the computer system itself.
Additional Information
- Viruses: A computer virus is a type of malicious software that, when executed, replicates itself by modifying other computer programs and inserting its own code. It often spreads to other computers by attaching itself to various programs and executing code when a user launches one of those infected programs.
- Worms: Worms are a type of malware similar to viruses, but they distinguishingly spread without user action. They typically spread across networks by exploiting operating system vulnerabilities, although they can also be spread through email attachments.
- Spyware: Spyware is software that aims to gather information about a person or organization without their knowledge and that may send such information to another entity without the user's consent, or asserts control over a device without the user's knowledge.
- Ransomware: Ransomware is a type of malicious software designed to block access to a computer system or computer files until a sum of money is paid. Most ransomware scams involve hackers encrypting users' data and then selling it back to its owner in exchange for cryptocurrency.
- Rootkits: Rootkits are a type of stealthy malware that's designed to provide continuous privileged access to a computer while actively hiding its existence. The term rootkit represents a combination of words "root" (the traditional name of the privileged account on Unix operating systems) and "kit" (which refers to the software tools that carry out the tool's action).
- Adware: While not always harmful, adware is often intrusive. This type of software automatically generates and shows advertisements when a program is running. While often just annoying, adware can slow down systems and sometimes come bundled with spyware which can violate user privacy.
- Keyloggers: A keylogger is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard.
Library Science Question 3:
What are the Advantages of Computer Networks
(A). File Transfer and Resource Sharing
(B). Decentralized Software Management
(C). Communication and Collaboration
(D). Remote Access
Answer (Detailed Solution Below)
Library Science Question 3 Detailed Solution
The correct answer is A, C, and D.
Key Points
- Advantages of Computer Networks:
- File Transfer and Resource Sharing: Networks enable the rapid transfer of large files, including programs and data, and allow shared access to devices such as printers, scanners, and CD-ROM drives. This streamlines operations and optimizes resource use
- Speed: Transferring and sharing files via a network is quick, saving time and ensuring file integrity is maintained
- Communication and Collaboration: Networks facilitate various communication methods like email, newsgroups, and video conferencing. They also support collaborative work, allowing multiple users to work on the same project or document simultaneously
- Increased Storage Capacity: Networks allow computers to share storage space. Data can be stored on off-site servers with regular backups, enhancing storage capacity and data protection.
- Remote Access: Users can access files and data remotely, even from mobile devices, reducing the need to carry storage devices for data transfer.
- Centralized Software Management: Networks enable easy sharing of software, with networkable versions of software being more cost-effective than individual licenses. This can significantly reduce costs for large organizations by networking their computers.
Library Science Question 4:
Which of the following are the parts of a URL (Universal Resource Locator)?
(a) Protocol.
(b) Media Access Control.
(c) Domain name.
(d) Path.
Answer (Detailed Solution Below)
Library Science Question 4 Detailed Solution
The Correct answer is (a), (c), and (d) are correct
Key Points
- A URL, which stands for Uniform Resource Locator, serves as a distinctive identifier for locating resources on the Internet, commonly known as a web address.
- Comprising various components such as a protocol and domain name, a URL guides a web browser on how and where to fetch a particular resource.
- A URL, comprises several elements:
- Protocol: The protocol (https) signifies the method for accessing the internet resource. Various protocols include http, https, ftps, mailto, and file.
- Host Name or Domain Name: The host name or domain name uniquely identifies the webpage.
- Port: The port (usually not visible) follows a colon, with port 80 being the default for web servers.
- Path: The path (search/query) denotes the file or location on the web server.
- Query: The query (?q=URL) appears in dynamic page URLs, containing parameters separated by ampersands (&).
- Parameters: Parameters (q=URL) are pieces of information in a query string.
- Fragment: The fragment (#history) is an internal page reference pointing to a specific section within the webpage.
Library Science Question 5:
Li-fi stands for ______.
Answer (Detailed Solution Below)
Library Science Question 5 Detailed Solution
The Correct answer is Light fidelity
Key Points
- Li-Fi:
- Li-Fi commonly stands for Light Fidelity.
- It is a wireless technology that transmits high-speed data using visible light communication (VLC) as a medium of transmission.
- It is capable of transmitting data at high speeds over visible light, ultraviolet, and infrared spectrums, and it can achieve communication over longer distances compared to traditional Wi-Fi in certain scenarios.
- The technology makes a LED light bulb emit pulses of light that are undetectable to the human eye and within those emitted pulses, data can travel to and from receivers.
- It multiplies the speed and bandwidth of wifi, 3G, and 4G. It means it is faster than Wi-Fi.
- Professor Harold Haas, a researcher at the University of Edinburgh, is widely credited with coining the term "Li-Fi" and pioneering the development of this technology. He introduced the concept of using visible light for wireless data communication and demonstrated its feasibility in various research projects.
- Li-Fi technology is designed to work efficiently in high data-density environments. In fact, one of the advantages of Li-Fi is its ability to handle high data rates and dense device connectivity.
Top Library Science MCQ Objective Questions
According to staff formula, which section of the university library needs to have "one person for every 50 readers using the library in a day of the year"?
Answer (Detailed Solution Below)
Library Science Question 6 Detailed Solution
Download Solution PDFThe correct answer is Reference:
Key Points
- Norms of UGC:
- The University Grants Commission (India), appointed in 1957 a committee under the Chairmanship of Dr. S.R. Ranganathan to advise the UGC about the development of university and college libraries and their organization.
- Reference Section: One person for every 50 readers (other than the users of the textbook collection) in a day.
- Book Section: One person for every 6000 volumes added in a year.
- Periodical Publications Section: One person for every 500 current periodicals taken.
- Documentation Section: One person for every 1000 entries prepared in a year.
- Technical Section: One person for every 2000 volumes added in a year.
- Maintenance Section: One person for every 6000 volumes added in a year, one person for every 500 volumes to be replaced daily, and one person for every 1,00,000 volumes in the library.
- Administrative Section: Minimum of one library accountant, one steno-typist, and one correspondence clerk.
- Circulation Section: 'One person for every 1500 hours for which one library gate has to be kept open in a year.
- Supervisory Section: One Librarian and one Assistant or Deputy Librarian.
- Unskilled Staff: One Cleaner for every 30,000 volumes in the library, one Attendant each for every 6,000 volumes added in a year, for every 500 current periodicals taken, and for each of the shifts in the Circulation Section, besides unskilled and semi-skilled workers normal to any institution
Additional Information
- Norms of AICTE
- AICTE (All India Council for Technical Education) is a statutory body established to properly plan and coordinate the development of technical education systems throughout the country.
- The AICTE recommends the following as norms for the library of a technical institution which has an initial stock of 4000 volumes of books and 36 journals (18 national, and 18 international (desirable):
a) Librarian - 1
b) Assistant Librarian- 1
c) Assistants - 4
Which of the following is NOT an output device?
Answer (Detailed Solution Below)
Library Science Question 7 Detailed Solution
Download Solution PDFThe correct answer is Touchscreen.
Key Points
- The touchscreen is not an output device.
- The mobile touchscreens generally contain 2 modules. One is touch and the other is the screen which displays the content on the mobile. So Touch is basically embedded with the sensors and the screen of the device. So in this manner touchscreen combined is an input and output device both.
- Plotter, printer, and monitor are output devices but a touch screen is not an output device.
- An output device is any piece of computer hardware equipment that converts information into human-readable form.
- It can be text, graphics, tactile, audio, and video.
- Some of the output devices are Visual Display Units i.e. a Monitor, Printer graphic Output devices, Plotters, Speakers.
- An output device is any hardware device used to send data from a computer to another device or user.
Additional Information
- An input device is a piece of equipment used to provide data and control signals to an information processing system such as a computer or information appliance.
- Examples of input devices include keyboards, mouse, scanners, cameras, joysticks, and microphones.
- Language and memory, Data and instructions, Text and graphics, Storage and commandsFeedbackCorrect.
- These are the two categories of input.
- Data can be unprocessed text or numbers, images, etc.
An attempt to obtain sensitive information such as username, password and credit card details etc. for malicious reasons, by posing as a trustworthy source in e-mail is called as
Answer (Detailed Solution Below)
Library Science Question 8 Detailed Solution
Download Solution PDFThe correct answer is Phishing.
Key Points
- Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.
- The first recorded use of the term "phishing" was in the cracking toolkit AOHell created by Koceilah Rekouche in 1995.
- Types of phishing:
- Email phishing
- Spear pishing
- Whaling and CEO Fraud
- Clone phishing
- Voice phishing
- SMS phishing
- Calendar phishing
- Page hijacking.
Dr. B.R Ambedkar was associated with which of the following communities?
Answer (Detailed Solution Below)
Library Science Question 9 Detailed Solution
Download Solution PDFThe correct answer is Mahar.
Key Points
- Dr. B. R. Ambedkar was an Indian jurist, politician, and social reformer.
- He is considered the father of the Indian constitution.
- He was born on 14th April 1891 at Mhow in the Central Provinces (now in Madhya Pradesh).
- He is popularly known as the 'Modern Manu'.
- He participated in all three round table conferences held in London.
- He served as the first law minister of the government of India from 1947 to 1951.
- He was appointed as the chairman of the Drafting Committee of the Indian Constitution.
- He was posthumously honored with the Bharat Ratna in 1990.
- Chaitya Bhoomi in Mumbai is the cremation place of B. R. Ambedkar.
Additional Information
- Notable works:
- Castes in India: Their Mechanism, Genesis and Development.
- The Untouchables.
- The Annihilation of Caste.
- The Buddha and his Dhamma.
- Image of Dr B.R. Ambedkar:-
What is the essential feature of WORM compared to other optical storage media?
Answer (Detailed Solution Below)
Library Science Question 10 Detailed Solution
Download Solution PDFThe correct answer is Recording once done is irreversible:
Key Points
- In computer media, write once, read many, or WORM, is a data storage technology that allows data to be written to a storage medium a single time and prevents the data from being erased or modified.
- Storage media that support WORM storage are purposely non-rewritable to prevent anyone from intentionally or accidentally erasing or modifying the data after it is initially stored.
- WORM media was developed in the late 1970s using optical disks. Over the years, these disks have varied from 5.25 to 14 inches in diameter.
- The CD-R, DVD-R, and BD-R optical discs for computers are common WORM devices.
Additional Information
- Optical media refers to any data storage device or equipment that uses optical data storage and retrieval techniques to read and write data.
- The first recorded historical use of an optical disc was in 1884 when Alexander Graham Bell, Chichester Bell, and Charles Sumner Tainter recorded sound on a glass disc using a beam of light.
- There are three main types of optical media: CD, DVD, and Blu-ray.
ASCII uses _______ bits to code each character.
Answer (Detailed Solution Below)
Library Science Question 11 Detailed Solution
Download Solution PDFThe correct answer is 7.
Key PointsASCII
- ASCII is a 7-bit code.
- It uses seven bits to represent a letter or a punctuation mark.
- It stands for American Standard Code for Information Interchange.
- It is a standard data-encoding format for electronic communication between computers.
- ASCII assigns standard numeric values to letters, numerals, punctuation marks, and other characters used in computers.
- The code was first published as a standard in 1967.
Which famous Indian musician played shehnai and received Bharat Ratna in the year 2001?
Answer (Detailed Solution Below)
Library Science Question 12 Detailed Solution
Download Solution PDFThe correct answer is Ustad Bismillah Khan
Key Points
- Ustad Bismillah Khan was born on 21 March 1916 in Dumraon village, Bihar.
- He settled in Varanasi with his father Prophet Bakhsh Khan at a very young age.
- Bismillah Khan was awarded the "Bharat Ratna" in 2001 by the Government of India.
- Ustad Bismillah Khan played the clarinet from the Red Fort when the country became independent in 1947.
- He died on 21 August 2006 at the age of 90.
Additional Information
- Pandit Ravi Shankar, mentioned in option 1, was a sitar player and composer who also received Bharat Ratna in 1999 for his contribution to Indian classical music.
- Pandit Shivkumar Sharma, mentioned in option 2, is a santoor player who received Padma Shri, Padma Bhushan, and Padma Vibhushan awards for his contribution to Indian classical music.
- Ustad Zakir Hussain, mentioned in option 3, is a tabla player who received Padma Shri, Padma Bhushan, and Padma Vibhushan awards for his contribution to Indian classical music.
Now 'DELNET' stands for:
Answer (Detailed Solution Below)
Library Science Question 13 Detailed Solution
Download Solution PDFThe correct answer is Developing Library Network.
Key Points
- DELNET
- DELNET (Delhi Library Network) was established in 1988 with the initial support of NISSAT.
- It was also supported by NIC and at the start of it, 30 Libraries in Delhi were added to this network.
- Later on, Its Name is changed to Developing Library Network.
- It is the Oldest and Largest Library Network in India.
- Presently in India, there are 250 libraries and in the world, 8 libraries are its member.
- It was registered as a society in 1992.
Who is known as father of Indian Library System?
Answer (Detailed Solution Below)
Library Science Question 14 Detailed Solution
Download Solution PDFThe Correct Answer is "Dr. S.R. Ranganthan"
- Dr. S.R. Rangathan is known as father of Indian Library System. Dr. S.R. Ranganathan was initially a mathematician who in his later stage of career turned into a Librarian and turned over the whole Indian Library System.
- Initially, he was Reluctant to join as Librarian, but after he accepted his position, he reached epitome in this profession.
The Marrakesh Treaty (2013) focuses on:
Answer (Detailed Solution Below)
Library Science Question 15 Detailed Solution
Download Solution PDFThe correct answer is "Providing access to published works for visually impaired persons".
Key Points
- Marrakesh Treaty 2013-
- The Marrakesh Treaty was adopted on June 27, 2013, and entered into force on September 30, 2016.
- It was administered by "World Intellectual Property Organization (WIPO)" providing access to published works for visually impaired persons.
- The treaty allows for copyright exceptions to facilitate the creation of accessible versions of books and other copyrighted works for visually impaired persons.
- India was the first country to ratify the treaty on June 24, 2014.
- It sets a norm for countries ratifying the treaty to have a domestic copyright exception and allow for the import and export of such materials.
- The objective of the Marrakesh VIP Treaty -
- The primary goal of the Marrakesh Treaty is to create a set of mandatory limitations and exceptions for the benefit of the blind, visually impaired, and otherwise print-disabled (VIPs).
- It Permits “Authorized entities” and “Beneficiaries” themselves to make accessible copies without the owner's permission or license.
- It makes provision to permit cross-border sharing of these accessible format works.