21. Identify the types of OCR technology
i. Matrix matching
ii. Instructional
analysis
iii. Feature
extraction
iv. Structural
analysis
Codes :
(A) i, ii, iv are
true. (B) i, ii, iii are true.
(C) ii, iii, iv
are true. (D) i, iii, iv are true.
Ans:4
22. Match the following search techniques with their
relevant example :
List – I List – II
a. Truncation i. Wom?n
b. Wild cards ii. Comput*
c. Proximity iii. edu AND biochemistry AND antibodies
d. Field searching iv. “content collection”/5
Codes :
a b c d
(A) ii iii iv i
(B) iv iii ii i
(C) i ii iii iv
(D) ii i iv iii
Ans:4
23. Which of the following are features of flash memory ?
i. Erasable &
Programmable Read Only Memory
ii. Non-volatile
memory
iii. Temporary
storage unit
iv. Dynamic RAM
Codes :
(A) i, ii, iii are
correct. (B) i, ii, iv are correct.
(C) i, ii are
correct. (D) ii, iv are correct.
Ans:3
24. SQL is based on which of the following ?
i. Query string
ii. Relational algebra
iii. Relational
calculus iv. Web search queries
Codes :
(A) i, ii are
correct. (B) ii, iii are correct.
(C) iii, iv are
correct. (D) ii, iv are correct.
Ans:2
25. What are the approaches to plagiarism check of
academic publications ?
i. String matching
ii. Bag of words analysis
iii. Citation
analysis iv. Parse trees
Codes :
(A) ii, iv are
correct. (B) i, ii, iii are correct.
(C) i,iv are
correct. (D) i, iii, iv are correct.
Ans:2
26. Identify the technology of digitization.
i. Bit-depth
ii. Resolution
iii. Manipulation
iv. Image
enhancement
Codes :
(A) ii, iii, iv
are correct. (B) i, iii, iv are correct.
(C) i, ii, iv are
correct. (D) i, ii, iii are correct.
Ans:3
27. Which of the following are the types of validity of
measurement ?
i. Construct ii.
Current
iii. Content iv.
Predictive
Codes :
(A) i, ii, iii are
true. (B) ii, iii, iv are true.
(C) i, iii, iv are
true. (D) i, ii, iv are true.
Ans:3
28. Which are not open source library softwares ?
i. Bibliosys ii.
Evergreen
iii. New Genlib
iv. Virtua
Codes :
(A) i and ii are
correct. (B) i and iii are correct.
(C) i and iv are
correct. (D) ii and iv are correct.
Ans:3
29. Identify the abilities of an information literate
person :
i. the ability to
find information
ii. the ability to
prepare bibliographic description of information
iii. the ability
to use information
iv. the ability to
evaluate information
Codes :
(A) i, ii, iii are
correct. (B) i, iii, iv are correct.
(C) i, ii, iv are
correct. (D) ii, iii, iv are correct.
Ans:2
30. Which of the following are threats to information
security ?
i. Personal
firewalls ii. Compromise to IPR
iii. Anti-spyware
iv. Acts of espionage
Codes :
(A) i, ii, iii are
correct. (B) ii, iii are correct.
(C) ii, iv are
correct. (D) ii, iii, iv are correct.
Ans:3
No comments:
Post a Comment