LIS MCQs for Management Information & its Role. Here you will find the Library Science MCQs about Management Information & its Role. This is Quiz-6 of the Management Information & its Role MCQ series. If you are a student of Library and Information Management Sciences (LIMS) then these MCQs of Management Information & its Role are very important for you. In these MCQs, LIS MCQs about Management Information & its Role are discussed.
The Management Information & its Role are discussed in multiple choice question and answer (MCQs).
LIS MCQs about Management Information & its Role
Find below the MCQs of Library Management Information & its Role:
251. Live, interactive conversations over a public network
A. Voice mail
B. Chatting
C. E-mail
D. YouTube
252. A commercial organization with a permanent connection to the internet that sells temporary connections to subscribers
A. DSI
B. ISP
C. NOS
D. ISDN
253. The unique name of a collection of computers connected to the internet
A. FTP
B. Client Access
C. NOS
D. Domain name
254. Which of the following performs modulation and demodulation
A. Fiber optics
B. Satellite
C. Coaxial cable
D. Modem
255. A list of all the books or resources of more than one library made according to some cataloguing rules is called
A. Bibliography
B. Catalogue
C. Holding list
D. Union Catalogue
256. Computer specifically optimized to provide software and other resources to other computers over a network
A. Mainframe
B. Mini Computer
C. Personal Computer
D. Server Computer
257. An optical disk system that allows users to record data only once; data cannot be erased but can be read indefinitely
A. CD-R
B. WORM
C. DVD
D. Magnetic tape
258. A high-capacity optical storage medium that can store full-length videos and large amounts of data
A. CD-R
B. WORM
C. DVD
D. CD-ROM
259. Form of source data automation in which optical scanning devices read specially designed data of source documents and translate the data into digital form for the computer
A. Barcode
B. MICR
C. OCR
D. CRT
260. Input devices that translate images such as pictures or documents into digital form for processing
A. Barcode
B. Digital scanners
C. OCR
D. CRT
261. A computer device is precisely not an output but it may also act as an input device
A. Keyboard
B. Motherboard
C. Modem
D. Monitor
262. Select the best choice for transmitting data wirelessly
A. Ethernet port
B. MIDI port
C. IrDa port
D. Parallel port
263. This connects electronic musical devices
A. Ethernet port
B. MIDI port
C. IrDa port
D. Serial port
264. This resembles a telephone jack and is used for network access
A. Ethernet port
B. MIDI port
C. IrDa port
D. Serial port
265. Which of the following sends data one bit at a time
A. Ethernet port
B. MIDI port
C. IrDa port
D. Serial port
266. Which of the following sends data in groups of bits
A. Ethernet port
B. MIDI port
C. IrDa port
D. Parallel port
267. Some common search engines
A. Google Mamma Internet explore Spyware; Bookmark; Lycos
B. Yahoo; Google; Microsoft; Acrobat reader; Look smart; Mamma
C. Excite; HotBot; Lycos; Infoseek; Look smart; WebCrawlor; Ask
D. MSN; Hotmail; Yahoo; Internet explore; Google; AOL; Excel
268. A jump from text or an image map on a page to another type of file
A. Hypertext
B. Hyperlink
C. Hypermedia
D. Bookmark
269. A computer-based text retrieval system that enables the user to provide access to or to gain information related to a particular text
A. Hypertext
B. Hyperlink
C. Hypermedia
D. Bookmark
270. A style of building systems for organizing, structuring, and accessing information around a network of multimedia nodes, connected together by links
A. Hypertext
B. Hyperlink
C. Hypermedia
D. Bookmark
271. In which library they have 10,000 pages main website
A. Library of Congress
B. Chicago Library
C. National Library Canada
D. British Library
272. Which of the following is a network technique
A. PERT
B. MIS
C. MBO
D. OR
273. Initially, PERT technique was applied to
A. Construction projects
B. Railway projects
C. R&D projects
D. Archive projects
274. The process of passing information and understanding from one person to another is known as
A. Communication
B. Dissemination
C. Exchanging
D. Transmission
275. A pathway or medium by means of which information is passed from source to receiver is known as
A. Channel
B. Message
C. Source
D. Destination
276. A process by which information is exchanged between individuals through a common system of symbols, signs, or behavior is called
A. Languages
B. Symbols
C. Communication
D. Information
277. Office automation technology that facilitates the creation of documents through computerized text editing formatting storing and printing is known as
A. Desktop publishing
B. Management information systems
C. Word processing
D. Document imaging systems
278. Technology that produces professional-quality documents combining output from word processors with design, graphics, and special layout features
A. Desktop publishing
B. Management information systems
C. Word processing
D. Document imaging systems
279. The commission of illegal acts through the use of a computer or against a computer system
A. Computer crime
B. Computer hacking
C. Computer abuse
D. Computer jamming
280. The commission of acts involving a computer that may not be illegal but are considered unethical
A. Computer crime
B. Computer hacking
C. Computer abuse
D. Computer jamming
281. Which of the following are ways by which we can manage information in support of information resources
A. Security & privacy
B. Security & disposition
C. Storage & privacy
D. Storage & disposition
282. A world wide web and graphical screen display that welcomes the user and explains the organization that has created the page
A. Home page
B. Static page
C. URL
D. Search engine
283. A tool for locating specific sites or information on the Internet
A. Home page
B. Static page
C. URL
D. Search engine
284. The address of a specific resource on the Internet is known as
A. WWW
B. Google
C. URL
D. Yahoo
285. Hardware and software are placed between an organization’s internal network and an external network to prevent outsiders, from invading private networks
A. Firewall
B. Extranets
C. Security measurer
D. Push technology
286. An information system that automates the creation and revision of designs using sophisticated graphics software
A. CAD
B. DSS
C. KWS
D. MIS
287. A person who gains unauthorized access to a computer network for profit, criminal mischief, or personal pleasure
A. Operator
B. Computer person
C. Hacker
D. Lab Assistant
288. Rogue software programs that are difficult to detect, spread rapidly through computer systems, destroying data or disrupting processing and memory systems
A. Antivirus software
B. Computer virus
C. Online transaction processing
D. Fault-tolerant computer systems
289. Software designed to detect, and often eliminate, computer viruses from an information system
A. Antivirus software
B. Computer virus
C. Online transaction processing
D. Fault-tolerant computer systems
290. A fault or defect in a computer program, system, or machine is known as
A. Antivirus software
B. Computer virus
C. Bugs
D. Debugging
291. The process of discovering and eliminating the errors and defects
A. Antivirus software
B. Computer virus
C. Bugs
D. Debugging
292. software is designed to seize your personal information stored on your computer
A. Antivirus
B. Spyware
C. Adware
D. Firewall
293. An error in software or hardware is called a bug. What is the alternative computer jargon for it
A. Leech
B. Squid
C. Slug
D. Glitch
294. An example of information to support operation management is
A. Electronic document management system
B. Spreadsheet model of income projections
C. Business intelligence System
D. None of them
295. An example of information to support tactical management is
A. Business Intelligence systems
B. Spreadsheet model of income projections
C. Electronic document management system
D. None of them
296. Which type of software is focused on supporting communication, collaboration, and coordination
A. E-business software
B. Groupware
C. SCM software
D. CRM software
297. An application used in an organization that runs on a managed server external to the company
A. Packaged software
B. Bespoke software
C. Object-oriented software
D. Application service provider solution
298. The relational database environment has all of the following components except
A. Users
B. Separate files
C. Database
D. Query languages
299. Database management systems are intended to
A. Eliminate data redundancy
B. Establish relationships among records in different files
C. Manage file access
D. All of the above
300. The highest level in the hierarchy of data organization is called
A. Data bank
B. Database
C. Data file
D. Data record
So, these are the MCQs 251-300 for Library Management Information & its Role.
MCQs of Library Management Information & its Role
Topics Related to Library Science Subject:
- LIS MCQs of History & Development
- Data Processing & Retrieval Techniques
- Research Methodology
- Library and its Users
- Library and Information Centers Management
- Knowledge & Disaster Management
- Information System and Programs
- Reference and Information Services
- All other Library Science MCQs

