Library Science MCQs: Management Information & its Role – Quiz-6

LIS MCQs for Management Information & its Role. Here you will find the Library Science MCQs about Management Information & its Role. This is Quiz-6 of the Management Information & its Role MCQ series. If you are a student of Library and Information Management Sciences (LIMS) then these MCQs of Management Information & its Role are very important for you. In these MCQs, LIS MCQs about Management Information & its Role are discussed.

The Management Information & its Role are discussed in multiple choice question and answer (MCQs).

LIS MCQs about Management Information & its Role

Find below the MCQs of Library Management Information & its Role:

251. Live, interactive conversations over a public network
A. Voice mail
B. Chatting
C. E-mail
D. YouTube
➥ View Answer

252. A commercial organization with a permanent connection to the internet that sells temporary connections to subscribers
A. DSI
B. ISP
C. NOS
D. ISDN
➥ View Answer

253. The unique name of a collection of computers connected to the internet
A. FTP
B. Client Access
C. NOS
D. Domain name
➥ View Answer

254. Which of the following performs modulation and demodulation
A. Fiber optics
B. Satellite
C. Coaxial cable
D. Modem
➥ View Answer

255. A list of all the books or resources of more than one library made according to some cataloguing rules is called
A. Bibliography
B. Catalogue
C. Holding list
D. Union Catalogue
➥ View Answer

256. Computer specifically optimized to provide software and other resources to other computers over a network
A. Mainframe
B. Mini Computer
C. Personal Computer
D. Server Computer
➥ View Answer

257. An optical disk system that allows users to record data only once; data cannot be erased but can be read indefinitely
A. CD-R
B. WORM
C. DVD
D. Magnetic tape
➥ View Answer

258. A high-capacity optical storage medium that can store full-length videos and large amounts of data
A. CD-R
B. WORM
C. DVD
D. CD-ROM
➥ View Answer

259. Form of source data automation in which optical scanning devices read specially designed data of source documents and translate the data into digital form for the computer
A. Barcode
B. MICR
C. OCR
D. CRT
➥ View Answer

260. Input devices that translate images such as pictures or documents into digital form for processing
A. Barcode
B. Digital scanners
C. OCR
D. CRT
➥ View Answer

261. A computer device is precisely not an output but it may also act as an input device
A. Keyboard
B. Motherboard
C. Modem
D. Monitor
➥ View Answer

262. Select the best choice for transmitting data wirelessly
A. Ethernet port
B. MIDI port
C. IrDa port
D. Parallel port
➥ View Answer

263. This connects electronic musical devices
A. Ethernet port
B. MIDI port
C. IrDa port
D. Serial port
➥ View Answer

264. This resembles a telephone jack and is used for network access
A. Ethernet port
B. MIDI port
C. IrDa port
D. Serial port
➥ View Answer

265. Which of the following sends data one bit at a time
A. Ethernet port
B. MIDI port
C. IrDa port
D. Serial port
➥ View Answer

266. Which of the following sends data in groups of bits
A. Ethernet port
B. MIDI port
C. IrDa port
D. Parallel port
➥ View Answer

267. Some common search engines
A. Google Mamma Internet explore Spyware; Bookmark; Lycos
B. Yahoo; Google; Microsoft; Acrobat reader; Look smart; Mamma
C. Excite; HotBot; Lycos; Infoseek; Look smart; WebCrawlor; Ask
D. MSN; Hotmail; Yahoo; Internet explore; Google; AOL; Excel
➥ View Answer

268. A jump from text or an image map on a page to another type of file
A. Hypertext
B. Hyperlink
C. Hypermedia
D. Bookmark
➥ View Answer

269. A computer-based text retrieval system that enables the user to provide access to or to gain information related to a particular text
A. Hypertext
B. Hyperlink
C. Hypermedia
D. Bookmark
➥ View Answer

270. A style of building systems for organizing, structuring, and accessing information around a network of multimedia nodes, connected together by links
A. Hypertext
B. Hyperlink
C. Hypermedia
D. Bookmark
➥ View Answer

271. In which library they have 10,000 pages main website
A. Library of Congress
B. Chicago Library
C. National Library Canada
D. British Library
➥ View Answer

272. Which of the following is a network technique
A. PERT
B. MIS
C. MBO
D. OR
➥ View Answer

273. Initially, PERT technique was applied to
A. Construction projects
B. Railway projects
C. R&D projects
D. Archive projects
➥ View Answer

274. The process of passing information and understanding from one person to another is known as
A. Communication
B. Dissemination
C. Exchanging
D. Transmission
➥ View Answer

275. A pathway or medium by means of which information is passed from source to receiver is known as
A. Channel
B. Message
C. Source
D. Destination
➥ View Answer

276. A process by which information is exchanged between individuals through a common system of symbols, signs, or behavior is called
A. Languages
B. Symbols
C. Communication
D. Information
➥ View Answer

277. Office automation technology that facilitates the creation of documents through computerized text editing formatting storing and printing is known as
A. Desktop publishing
B. Management information systems
C. Word processing
D. Document imaging systems
➥ View Answer

278. Technology that produces professional-quality documents combining output from word processors with design, graphics, and special layout features
A. Desktop publishing
B. Management information systems
C. Word processing
D. Document imaging systems
➥ View Answer

279. The commission of illegal acts through the use of a computer or against a computer system
A. Computer crime
B. Computer hacking
C. Computer abuse
D. Computer jamming
➥ View Answer

280. The commission of acts involving a computer that may not be illegal but are considered unethical
A. Computer crime
B. Computer hacking
C. Computer abuse
D. Computer jamming
➥ View Answer

281. Which of the following are ways by which we can manage information in support of information resources
A. Security & privacy
B. Security & disposition
C. Storage & privacy
D. Storage & disposition
➥ View Answer

282. A world wide web and graphical screen display that welcomes the user and explains the organization that has created the page
A. Home page
B. Static page
C. URL
D. Search engine
➥ View Answer

283. A tool for locating specific sites or information on the Internet
A. Home page
B. Static page
C. URL
D. Search engine
➥ View Answer

284. The address of a specific resource on the Internet is known as
A. WWW
B. Google
C. URL
D. Yahoo
➥ View Answer

285. Hardware and software are placed between an organization’s internal network and an external network to prevent outsiders, from invading private networks
A. Firewall
B. Extranets
C. Security measurer
D. Push technology
➥ View Answer

286. An information system that automates the creation and revision of designs using sophisticated graphics software
A. CAD
B. DSS
C. KWS
D. MIS
➥ View Answer

287. A person who gains unauthorized access to a computer network for profit, criminal mischief, or personal pleasure
A. Operator
B. Computer person
C. Hacker
D. Lab Assistant
➥ View Answer

288. Rogue software programs that are difficult to detect, spread rapidly through computer systems, destroying data or disrupting processing and memory systems
A. Antivirus software
B. Computer virus
C. Online transaction processing
D. Fault-tolerant computer systems
➥ View Answer

289. Software designed to detect, and often eliminate, computer viruses from an information system
A. Antivirus software
B. Computer virus
C. Online transaction processing
D. Fault-tolerant computer systems
➥ View Answer

290. A fault or defect in a computer program, system, or machine is known as
A. Antivirus software
B. Computer virus
C. Bugs
D. Debugging
➥ View Answer

291. The process of discovering and eliminating the errors and defects
A. Antivirus software
B. Computer virus
C. Bugs
D. Debugging
➥ View Answer

292. software is designed to seize your personal information stored on your computer
A. Antivirus
B. Spyware
C. Adware
D. Firewall
➥ View Answer

293. An error in software or hardware is called a bug. What is the alternative computer jargon for it
A. Leech
B. Squid
C. Slug
D. Glitch
➥ View Answer

294. An example of information to support operation management is
A. Electronic document management system
B. Spreadsheet model of income projections
C. Business intelligence System
D. None of them
➥ View Answer

295. An example of information to support tactical management is
A. Business Intelligence systems
B. Spreadsheet model of income projections
C. Electronic document management system
D. None of them
➥ View Answer

296. Which type of software is focused on supporting communication, collaboration, and coordination
A. E-business software
B. Groupware
C. SCM software
D. CRM software
➥ View Answer

297. An application used in an organization that runs on a managed server external to the company
A. Packaged software
B. Bespoke software
C. Object-oriented software
D. Application service provider solution
➥ View Answer

298. The relational database environment has all of the following components except
A. Users
B. Separate files
C. Database
D. Query languages
➥ View Answer

299. Database management systems are intended to
A. Eliminate data redundancy
B. Establish relationships among records in different files
C. Manage file access
D. All of the above
➥ View Answer

300. The highest level in the hierarchy of data organization is called
A. Data bank
B. Database
C. Data file
D. Data record
➥ View Answer

So, these are the MCQs 251-300 for Library Management Information & its Role.

MCQs of Library Management Information & its Role

Quiz-01, Quiz-06,

Topics Related to Library Science Subject:

Admin
Admin

I am interested in writing content for educational purpose.

Leave a Reply

Your email address will not be published. Required fields are marked *