Professional Documents
Culture Documents
developed by Google and integrated into their web-based email program, Gmail.
Launched February 9, 2010. Current status Discontinued December 15, 2011.
Google Scholar is a freely accessible web search engine that indexes the full text of
scholarly literature.
Face book is a social networking service launched in February 2004, owned and
operated by Face book, Inc.Created by Mark Zuckerberg, Eduardo Saverin, Andrew McCollum,
Dustin Moskovitz, Chris Hughes. Written in C++ and PHP.
1994 IBM Web Explorer, Netscape Navigator, Slipknot 1.0, Mac Web,
IBrowse, Agora (Argo), Minuet
1997 Internet Explorer 4.0, Netscape Navigator 4.0, Netscape Communicator 4.0,
Opera 3.0,[7] Amaya 1.0
1998 iCab, Mozilla
2000 Konqueror, Netscape 6, Opera 4,[8] Opera 5,[9] K-Meleon 0.2, Amaya 3.0,[6]
Amaya 4.0
2002 Netscape 7, Mozilla 1.0, Phoenix 0.1, Links 2.0, Amaya 6.0,[6] Amaya 7.0[6]
2005 Safari 2.0, Netscape Browser 8.0, Opera 8,[12] Epiphany 1.8, Amaya 9.0,[6] AOL
Explorer 1.0, Maxthon 1.0, Shiira 1.0
2006 SeaMonkey 1.0, K-Meleon 1.0, Galeon 2.0, Camino 1.0, Firefox 2.0, Avant 11,
iCab 3, Opera 9,[13] Internet Explorer 7
2007 Maxthon 2.0, Netscape Navigator 9, NetSurf 1.0, Flock 1.0, Safari 3.0,
Conkeror
2008 Konqueror 4, Safari 3.1, Opera 9.5,[14] Firefox 3, Amaya 10.0,[6] Flock 2,
Chrome 1, Amaya 11.0[6]
2009 Internet Explorer 8, Chrome 2-3, Safari 4, Opera 10,[15] SeaMonkey 2, Camino
2, Firefox 3.5
2010 K-Meleon 1.5.4, Firefox 3.6, Chrome 4-8, Opera 10.50,[16] Safari 5, xxxterm,
Opera 11
2011 Chrome 9-16, Firefox 4-9, Internet Explorer 9, Maxthon 3.0, SeaMonkey 2.1-
2.3, Opera 11.50, and Safari 5.
2012 Chrome 17-22, Firefox 10-15, Internet Explorer 10, Opera 12, and Safari 6?
Drop box is a file hosting service operated by Drop box, Inc. that offers cloud storage, file
synchronization, and client software. Drop box allows users to create a special folder on each of their
computers, which Drop box then synchronizes so that it appears to be the same folder (with the same
contents) regardless of the computer it is viewed on. Files placed in this folder are also accessible
through a website and mobile phone applications. Drop box, Inc. was founded in 2007 by MIT
graduates Drew Houston and Arash Ferdowsi, as a Y Combinator startup company. Drop box provides
client software for Microsoft Windows, Apple Mac OS X, Linux, for Google Android, Apple iOS, and
Blackberry OS, and web browsers.
Developer(s) Drop box, Inc.
Written in Python
Operating system Microsoft Windows, Mac OS 10.4 and later, Linux, iOS, Android, Symbian,
. Blackberry OS, MeeGo Harmattan (Nokia N9)
License Proprietary software (Windows & Mac clients and Linux Dropbox daemon), GPLv2 ------
. (Linux Nautilus)
Website www.dropbox.com
Spotify is a Swedish music streaming service offering digitally restricted streaming of selected
music from a range of major and independent record labels, including Sony, EMI, Warner Music
Group and Universal. Launched in October 2008 by Swedish startup Spotify AB, the service had
approximately ten million users as of 15 September 2010. Spotify has been developed since 2006 by a
team at Spotify AB, Stockholm, Sweden. The company was founded there by Daniel Ek, former CTO
of Stardoll, and Martin Lorentzon, co-founder of TradeDoubler. The parent company is now Spotify
Ltd in London, while research and development remains carried out by Spotify AB in Stockholm.The
Spotify application was launched for public access on 7 October 2008.
Developer(s) Spotify LTD
Development status Active Written in C++ (With some third party libraries)
Website www.spotify.com
Airbnb
Type Private
Founded 2008
Headquarters San Francisco, USA
Brian Chesky (CEO, Co-Founder)
Key people Joe Gebbia (Chief Product Officer, Co-Founder)
Nathan Blecharczyk (CTO, Co-founder)
Industry social networking service
Website airbnb.com
Airbnb is an online service that matches people seeking vacation rentals and other
short-term accommodations with hosts who have an unused space to rent, generally
private parties that are not professional hoteliers. The site was founded in August
2008 by Nathan Blecharczyk, Brian Chesky and Joe Gebbia. In July 2012, the
company had over 200,000 listings in more than 26,000 cities and present in 192
countries with over 1,000,000 hosts and travellers on its platform.Listings include
private rooms, entire apartments, castles, boats, manors, tree houses, tipis, igloos,
specialty design housing, private islands and other properties.
Type Private
Website foursquare.com
Iaslic-1955
Aslib-1924
Thesaurofacet- Atchinson
Subject Classification-Browne’s
Brain boost · Chunk It! Clusty · Deeper Web · Dog pile · Excite ·
Harvester42 · HotBot · Info.com, Mamma ...are Meta Search Engines or
Meta crawlers
Metasearch engines are the one which give the information from the
search engines
Blake-Leadership style
INIS-International Nuclear Information System
IAEa-1957-International Atomic Energy Agency
DDC-1876
R.R. Bowker the official us ISBN agency the publisher of books in print
Coaxial-TV
Twisted wire-Phone
CCF -1924
The first Maritime Library Association was founded April 17, 1918 at Acadia University name changed to
Atlantic Provinces Library Association" (APLA) was made in 1957
Tim O'Reilly attempts to clarify just what is meant by Web 2.0, the term
first coined at a conference brainstorming session between O’Reilly...
The first major English-language cataloguing code was that developed by Sir
Anthony Panizzi for the British Museum catalogue. Panizzi’s 91 rules were approved
by the British Museum in 1839, and published in 1841[1].
The British Museum rules were revised up until 1936.
The library departments of the British Museum became part of the new British
Library in 1973.
The first edition of Charles Ammi Cutter’s Rules for a Dictionary Catalog was published
in 1876 [2].
Cutter’s rules set out the first principles of cataloguing, and included a statement of
the objectives of the catalogue.
The code covered rules for dictionary catalogues including both entry (for authors,
titles, subjects, and form headings), and description.
The American Library Association (ALA) cataloguing rules “Condensed Rules for an
Author & Title Catalog” were first published in the Library Journal in 1883 [3].
In 1900 ALA appointed a committee led by J.C.M. Hanson of the Library of
Congress to revise these rules. Of particular focus was agreement of the ALA rules
and the rules of the Library of Congress due to the upcoming introduction of
Library of Congress printed cataloguing cards.
In 1902 an advance edition of the revised ALA rules was produced by the Library of
Congress.
Efforts were made to bring about uniformity between the ALA rules and the fourth
edition of Cutter’s rules (published in 1904).
In 1893 the “Cataloguing Rules” of the Library Association (LA) were published [4].
In 1902 a Committee was formed to revise these rules, and in its work drew heavily
on the British Museum rules, and the advance edition of the revised ALA rules.
A draft revision of the LA rules was discussed at the 1904 meeting of the Library
Association.
Co-operation
In light of the similar work being done on both sides of the Atlantic, Melvil Dewey
suggested that there should be co-operation to produce an Anglo-American code.
The American Library Association and the Library Association formally agreed to
co-operate in 1904. Consultation between the two bodies occurred by
correspondence.
The first international cataloguing code was published in 1908 in an American
edition (Catalog Rules, Author and Title Entries [5]) and a British edition (Cataloguing
Rules, Author and Title Entries [6])
Both editions contained 174 rules covering both entry and heading for authors and
titles, and description.
Areas of disagreement between the two editions centred on authors and publications
that changed names or titles.
In both editions disagreements were explained either in a note or by printing two
versions of the rule. Library of Congress supplementary rules were also included
where necessary.
1949 edition
The 1941 edition was criticized for being too detailed and complex, and in 1949
A.L.A. Cataloging Rules for Author and Title Entries was published [8]. This edition
contained only rules for entry and heading.
American alternative rules in the 1908 code were reflected in the 1949 code.
In 1951 the American Library Association asked Seymour Lubetzky, of the Library
of Congress, to analyse the 1949 ALA code. An approach was also made to the
Library Association regarding co-ordination of revision of the 1949 code.
In 1953 Lubetzky’s report (Cataloging Rules and Principles [10]) was published. This
work advocated a move towards a principle-based rather than case-based code.
In 1956 Lubetzky was appointed editor of the revised code, and in 1960 he produced
the draft Code of Cataloging Rules; Author and Title Entry [11].
The International Conference on Cataloguing Principles was held in Paris in 1961 to
examine the choice and form of headings in author/title catalogues. The outcome
was a statement of 12 principles known as the Paris Principles [12].
In 1962 C. Sumner Spalding, of the Library of Congress, became the new editor of
the code.
The American Library Association and Library Association co-operated by
exchanging minutes and working papers, and attending each other’s meetings. In
addition, the Library of Congress assisted with revision of the descriptive cataloguing
rules, and the Canadian Library Association was involved in reviewing drafts of the
rules.
In 1967 two versions of the Anglo-American Cataloguing Rules (AACR) were published,
a North American text [13] and a British text [14].
Both texts of AACR contained three parts:
Each text contained an appendix listing rules for entry and heading that differed in
the other version.
In 1966 there was a “memorandum of agreement” for continued revision of AACR
between ALA and LA. In light of their earlier involvement, the Library of Congress
and the Canadian Library Association were also formally represented in the revision
process.
Amendments and changes from 1969-1975 were published for the North American
text in the Library of Congress Cataloging Service and for the British text in the Library
Association Anglo-American Cataloguing Rules Amendment Bulletin.
AACR2 1978
In 1974 the Joint Steering Committee for the Revision of AACR (JSC) was
established, with membership from the American Library Association, the British
Library, the Canadian Library Association (represented by the Canadian Committee
on Cataloguing), the Library Association, and the Library of Congress.
The JSC was charged with incorporating the North American and British texts into a
single version. The JSC appointed two editors for the revised code, Michael Gorman
of the British Library, and Paul W. Winkler of the Library of Congress.
The Anglo-American Cataloguing Rules, Second edition (AACR2) was published in one
version in 1978 [21].
AACR2 was divided into two parts:
Part I, Description
– Based on the ISBD(G) framework.
– Included a general chapter (chapter 1), and chapters for individual
formats, including new chapters for machine-readable data files (chapter
9) and three-dimensional artefacts and realia (chapter 10).
– The rules for non-book materials were based on alternative codes that
were published in the 1970s.
AACR2 was adopted by the Library of Congress, the National Library of Canada,
the British Library, and the Australian National Library in January 1981.
In 1981 an abridged version, the Concise AACR2 was published [22].
Revisions to AACR2 were adopted in 1982, 1983 (published 1984), and 1985
(published 1986).
A draft revision of AACR2 chapter 9 (renamed: Computer Files) was published in
1987 [23].
From 1981 an Australian Committee on Cataloguing (ACOC) representative was
sent to JSC meetings, and from 1986 ACOC became a full JSC member.
1988 Revision
The 1988 Revision of AACR2 incorporated the 1982, 1983, and 1985 revisions plus
subsequent unpublished revisions [24].
The 1988 Revision was published in both book and loose-leaf format.
One set of amendments was published in 1993.
1998 Revision
The 1998 Revision of AACR2 incorporated the 1993 amendments, and revisions
approved between 1992 and 1996 [25].
The 1998 Revision was published in book and CDROM format.
Amendments packages were published in 1999 and 2001. The 2001 amendments
included a complete revision of chapter 9 (renamed: Electronic Resources).
2002 Revision
The 2002 Revision of AACR2 incorporated the 1999 and 2001 amendments, and
changes approved in 2001, including complete revisions of chapter 3 (Cartographic
Materials) and chapter 12 (renamed: Continuing Resources) [26].
The revision of chapter 12 arose from a recommendation of the International
Conference on the Principles and Future Development of AACR, and IFLA-led
efforts to harmonize ISBD (CR), ISSN practice, and AACR2.
In 2002 AACR was published only in loose-leaf format.
For more information of the history of AACR, see also the 1978, 1988 and 1998 AACR2
prefaces.
The British Library Automated Information Service (BLAISE
LIBRI is in Germany(doubt)
The Indian Patent Office is administered by the Office of the Controller General of Patents, Designs
& Trade Marks (CGPDTM). This is a subordinate office of the Indian government and administers the
Indian law of Patents, Designs and Trade Marks.
The CGPDTM reports to the Department of Industrial Policy and Promotion(DIPP) under the Ministry
of Commerce and Industry and has five main administrative sections:
Patents
Designs
Trade Marks
Geographical indications
Patent Information System
The patent office is headquartered at Kolkata with branches in Chennai, New Delhi
and Mumbai, but the office of the CGPDTM is in Mumbai. The office of the Patent
Information System is at Nagpur.
The Controller General, who supervises the administration of the Patents Act, the
Designs Act, and the Trade Mark's Act, also advises the Government on matters
relating to these subjects. Mr. P.H.Kurian was the first IAS officer to serve as the
Controller General. Mr Chaitanaya Prasad has assumed charge as CGPDTM recently.
The term "web log" was coined by Jorn Barger on 17 December 1997. The
short form, "blog," was coined by (Peter Merholz), who jokingly broke the
word web log ... in the question paper only the answer Jorn Barger is present for
blog.
ALA-CHICAGO-1876
In simplex transmission, data flow only in one direction -- from the sending device to the
receiving device.
Simplex transmission is used only when the sending device does not require a response
from the receiving device.
Security systems and fire alarms that contain a sensor use simplex transmission.
In half-duplex transmission, data can flow in either direction -- from the sending device to
the receiving device, and back -- but only in one direction at a time.
Many fax machines, credit card verification systems, and automatic teller machines use
half-duplex transmission.
In full-duplex transmission, data can flow in both directions at the same time.
Micropaedia – 11 Volumes
SENDOC-HYDERABAD
NASSDOC-New Delhi
BARC-Mumbai
The Digital Millennium Copyright Act (DMCA-1998 ) is a United
States copyright law that implements two 1996 treaties of the World
Intellectual Property Organization (WIPO). It criminalizes prod
The Information Technology Act -2000 has been passed to give
effect to the UN resolution and to promote efficient delivery of
Government services by means of reliable electronic records.
ASLIB- 1924
MARC – 1960
ISBD-1981
Ccf-1990
Baroda Library Association (1910), Andhra Desa Library Association (1914), Bengal
Library Association (1927) and Madras Library Association (1927). The Indian
Library Association was founded in 1933. The Post-independence period has
witnessed an
Coaxial cable-Tv
Fibre optic cable- computer networks
Twisted pair cable- telephone
Table 1 – Subdivisions
One of the oldest programming languages, the FORTRAN were developed by a team
of programmers at IBM led by John Backus, and was first published in 1957. The
name FORTRAN is an acronym for FORmula TRANslation, because it was designed
to allow easy translation of math formulas into code.
The original Dartmouth BASIC was designed in 1964 by John George Kemeny and Thomas Eugene
Kurtz
ccc- 1934
Iaslic-1955
Aslib-1924
Thesaurofacet- Atchinson
Subject Classification-Browne’s
Brain boost · Chunk It! Clusty · Deeper Web · Dog pile · Excite ·
Harvester42 · HotBot · Info.com, Mamma ...are Meta Search Engines or
Meta crawlers
Metasearch engines are the one which give the information from the
search engines
Blake-Leadership style
INIS-International Nuclear Information System
IAEa-1957-International Atomic Energy Agency
DDC-1876
R.R. Bowker the official us ISBN agency the publisher of books in print
Coaxial-TV
Twisted wire-Phone
CCF -1924
The first Maritime Library Association was founded April 17, 1918 at Acadia University name changed to
Atlantic Provinces Library Association" (APLA) was made in 1957
Tim O'Reilly attempts to clarify just what is meant by Web 2.0, the term
first coined at a conference brainstorming session between O’Reilly...
The first major English-language cataloguing code was that developed by Sir
Anthony Panizzi for the British Museum catalogue. Panizzi’s 91 rules were approved
by the British Museum in 1839, and published in 1841[1].
The British Museum rules were revised up until 1936.
The library departments of the British Museum became part of the new British
Library in 1973.
The first edition of Charles Ammi Cutter’s Rules for a Dictionary Catalog was published
in 1876 [2].
Cutter’s rules set out the first principles of cataloguing, and included a statement of
the objectives of the catalogue.
The code covered rules for dictionary catalogues including both entry (for authors,
titles, subjects, and form headings), and description.
The American Library Association (ALA) cataloguing rules “Condensed Rules for an
Author & Title Catalog” were first published in the Library Journal in 1883 [3].
In 1900 ALA appointed a committee led by J.C.M. Hanson of the Library of
Congress to revise these rules. Of particular focus was agreement of the ALA rules
and the rules of the Library of Congress due to the upcoming introduction of
Library of Congress printed cataloguing cards.
In 1902 an advance edition of the revised ALA rules was produced by the Library of
Congress.
Efforts were made to bring about uniformity between the ALA rules and the fourth
edition of Cutter’s rules (published in 1904).
In 1893 the “Cataloguing Rules” of the Library Association (LA) were published [4].
In 1902 a Committee was formed to revise these rules, and in its work drew heavily
on the British Museum rules, and the advance edition of the revised ALA rules.
A draft revision of the LA rules was discussed at the 1904 meeting of the Library
Association.
Co-operation
In light of the similar work being done on both sides of the Atlantic, Melvil Dewey
suggested that there should be co-operation to produce an Anglo-American code.
The American Library Association and the Library Association formally agreed to
co-operate in 1904. Consultation between the two bodies occurred by
correspondence.
The first international cataloguing code was published in 1908 in an American
edition (Catalog Rules, Author and Title Entries [5]) and a British edition (Cataloguing
Rules, Author and Title Entries [6])
Both editions contained 174 rules covering both entry and heading for authors and
titles, and description.
Areas of disagreement between the two editions centred on authors and publications
that changed names or titles.
In both editions disagreements were explained either in a note or by printing two
versions of the rule. Library of Congress supplementary rules were also included
where necessary.
1949 edition
The 1941 edition was criticized for being too detailed and complex, and in 1949
A.L.A. Cataloging Rules for Author and Title Entries was published [8]. This edition
contained only rules for entry and heading.
American alternative rules in the 1908 code were reflected in the 1949 code.
In 1951 the American Library Association asked Seymour Lubetzky, of the Library
of Congress, to analyse the 1949 ALA code. An approach was also made to the
Library Association regarding co-ordination of revision of the 1949 code.
In 1953 Lubetzky’s report (Cataloging Rules and Principles [10]) was published. This
work advocated a move towards a principle-based rather than case-based code.
In 1956 Lubetzky was appointed editor of the revised code, and in 1960 he produced
the draft Code of Cataloging Rules; Author and Title Entry [11].
The International Conference on Cataloguing Principles was held in Paris in 1961 to
examine the choice and form of headings in author/title catalogues. The outcome
was a statement of 12 principles known as the Paris Principles [12].
In 1962 C. Sumner Spalding, of the Library of Congress, became the new editor of
the code.
The American Library Association and Library Association co-operated by
exchanging minutes and working papers, and attending each other’s meetings. In
addition, the Library of Congress assisted with revision of the descriptive cataloguing
rules, and the Canadian Library Association was involved in reviewing drafts of the
rules.
In 1967 two versions of the Anglo-American Cataloguing Rules (AACR) were published,
a North American text [13] and a British text [14].
Both texts of AACR contained three parts:
Each text contained an appendix listing rules for entry and heading that differed in
the other version.
In 1966 there was a “memorandum of agreement” for continued revision of AACR
between ALA and LA. In light of their earlier involvement, the Library of Congress
and the Canadian Library Association were also formally represented in the revision
process.
Amendments and changes from 1969-1975 were published for the North American
text in the Library of Congress Cataloging Service and for the British text in the Library
Association Anglo-American Cataloguing Rules Amendment Bulletin.
AACR2 1978
In 1974 the Joint Steering Committee for the Revision of AACR (JSC) was
established, with membership from the American Library Association, the British
Library, the Canadian Library Association (represented by the Canadian Committee
on Cataloguing), the Library Association, and the Library of Congress.
The JSC was charged with incorporating the North American and British texts into a
single version. The JSC appointed two editors for the revised code, Michael Gorman
of the British Library, and Paul W. Winkler of the Library of Congress.
The Anglo-American Cataloguing Rules, Second edition (AACR2) was published in one
version in 1978 [21].
AACR2 was divided into two parts:
Part I, Description
– Based on the ISBD(G) framework.
– Included a general chapter (chapter 1), and chapters for individual
formats, including new chapters for machine-readable data files (chapter
9) and three-dimensional artefacts and realia (chapter 10).
– The rules for non-book materials were based on alternative codes that
were published in the 1970s.
AACR2 was adopted by the Library of Congress, the National Library of Canada,
the British Library, and the Australian National Library in January 1981.
In 1981 an abridged version, the Concise AACR2 was published [22].
Revisions to AACR2 were adopted in 1982, 1983 (published 1984), and 1985
(published 1986).
A draft revision of AACR2 chapter 9 (renamed: Computer Files) was published in
1987 [23].
From 1981 an Australian Committee on Cataloguing (ACOC) representative was
sent to JSC meetings, and from 1986 ACOC became a full JSC member.
1988 Revision
The 1988 Revision of AACR2 incorporated the 1982, 1983, and 1985 revisions plus
subsequent unpublished revisions [24].
The 1988 Revision was published in both book and loose-leaf format.
One set of amendments was published in 1993.
1998 Revision
The 1998 Revision of AACR2 incorporated the 1993 amendments, and revisions
approved between 1992 and 1996 [25].
The 1998 Revision was published in book and CDROM format.
Amendments packages were published in 1999 and 2001. The 2001 amendments
included a complete revision of chapter 9 (renamed: Electronic Resources).
2002 Revision
The 2002 Revision of AACR2 incorporated the 1999 and 2001 amendments, and
changes approved in 2001, including complete revisions of chapter 3 (Cartographic
Materials) and chapter 12 (renamed: Continuing Resources) [26].
The revision of chapter 12 arose from a recommendation of the International
Conference on the Principles and Future Development of AACR, and IFLA-led
efforts to harmonize ISBD (CR), ISSN practice, and AACR2.
In 2002 AACR was published only in loose-leaf format.
For more information of the history of AACR, see also the 1978, 1988 and 1998 AACR2
prefaces.
The British Library Automated Information Service (BLAISE
LIBRI is in Germany(doubt)
The Indian Patent Office is administered by the Office of the Controller General of Patents, Designs
& Trade Marks (CGPDTM). This is a subordinate office of the Indian government and administers the
Indian law of Patents, Designs and Trade Marks.
The CGPDTM reports to the Department of Industrial Policy and Promotion(DIPP) under the Ministry
of Commerce and Industry and has five main administrative sections:
Patents
Designs
Trade Marks
Geographical indications
Patent Information System
The patent office is headquartered at Kolkata with branches in Chennai, New Delhi
and Mumbai, but the office of the CGPDTM is in Mumbai. The office of the Patent
Information System is at Nagpur.
The Controller General, who supervises the administration of the Patents Act, the
Designs Act, and the Trade Mark's Act, also advises the Government on matters
relating to these subjects. Mr. P.H.Kurian was the first IAS officer to serve as the
Controller General. Mr Chaitanaya Prasad has assumed charge as CGPDTM recently.
The term "web log" was coined by Jorn Barger on 17 December 1997. The
short form, "blog," was coined by (Peter Merholz), who jokingly broke the
word web log ... in the question paper only the answer Jorn Barger is present for
blog.
ALA-CHICAGO-1876
In simplex transmission, data flow only in one direction -- from the sending device to the
receiving device.
Simplex transmission is used only when the sending device does not require a response
from the receiving device.
Security systems and fire alarms that contain a sensor use simplex transmission.
In half-duplex transmission, data can flow in either direction -- from the sending device to
the receiving device, and back -- but only in one direction at a time.
Many fax machines, credit card verification systems, and automatic teller machines use
half-duplex transmission.
In full-duplex transmission, data can flow in both directions at the same time.
Micropaedia – 11 Volumes
SENDOC-HYDERABAD
NASSDOC-New Delhi
BARC-Mumbai
The Digital Millennium Copyright Act (DMCA-1998 ) is a United
States copyright law that implements two 1996 treaties of the World
Intellectual Property Organization (WIPO). It criminalizes prod
The Information Technology Act -2000 has been passed to give
effect to the UN resolution and to promote efficient delivery of
Government services by means of reliable electronic records.
ASLIB- 1924
MARC – 1960
ISBD-1981
Ccf-1990
Baroda Library Association (1910), Andhra Desa Library Association (1914), Bengal
Library Association (1927) and Madras Library Association (1927). The Indian
Library Association was founded in 1933. The Post-independence period has
witnessed an
Coaxial cable-Tv
Fibre optic cable- computer networks
Twisted pair cable- telephone
Table 1 – Subdivisions
One of the oldest programming languages, the FORTRAN were developed by a team
of programmers at IBM led by John Backus, and was first published in 1957. The
name FORTRAN is an acronym for FORmula TRANslation, because it was designed
to allow easy translation of math formulas into code.
The original Dartmouth BASIC was designed in 1964 by John George Kemeny and Thomas Eugene
Kurtz
ccc- 1934
17) Which of the following is an Open 23) First university to introduce MPhil and
Source Software? PhD in LIS in India
(A) E-Granthalaya (A) Aligarh Muslim University
(B) SOUL 2.0 (B) University of Calcutta
(C) Koha (C) University of Delhi
(D) LibSys 7 (D) University of Madras
19) First generation computer uses 25) Second generation computer uses
(A) Microprocessor (A) Thermionic valves or vacuum tube or
(B) Transistors electronic valves
(C) Integrated circuits (B) Microprocessor
(D) Thermionic valves or vacuum tube or (C) Integrated circuits
electronic valves (D) Transistors
(B) Copyright
102) ‘Fair use’ is a term most relevant to:
(C) Patent
(A) Intellectual Property Rights
(D) Standards
(B) Books borrowed for home reading
(C) World International Property 107) Which one of the following is not
Organisation associated with the communication system?
109) Who was the chairman of National (D) The Design Act of 1911
Library Committee of India?
(A) B. S. Jha
113) Whether intellectual property can be
(B) K. P. Sinha sold.
115) Who is the propounder of the term 119) Delivery of Book Act passed in the
information transfer? year
116) To which country the credit is given to 120) Now a day’s what is a most important
coin the term information society? vital resource for societal development of a
country ?
(A) USA
(A) Books
(B) France
(B) Kowledge
(C) Japan
(C) Information
(D) India
(D) Data
117) Today information is regarded as
which of the following? 121) Who is the Father of a computer
118) What is the unit of information? 122) When was Dr. S. R. Ranganathan was
appointed as a National research professor of
(A) Bit Library science
(C) S.N.D.T. Women University, Bombay 127) When did ILA became the member of
IFLA?
(D) Aligar Muslim University
(A) 1952
(B) 1955
124) Which Commission recommended 10%
of the total college budget for development (C) 1957
of Libraries?
(D) 1965
(A) Dr. S. R. Ranganathan Committee
(B) 2005
(C) ALA
134) Which two organizations jointly publish
(D) COMLA survey on digitization and preservation?
(C) 1940
135) Who said that “Librarianship is not a
(D) 1945 profession”?
132) Which organization has introduced the (B) Goode, Rossi, Shaffer, Gullis
concept of “Sister libraries” for children`s
and young adults reading? (C) Dewey, Rundey, Reeves, Aishen
(B) IFLA
(B) Nalanda
137) In which year International institute of
Documentation changed to International (C) Vallabhi
federation of Documentation?
(D) Sravasti
(A) 1931
(B) 1937
141) When was the curriculam development
(C) 1945 committee on LIS instituted?
(B) 1990-93
(B) 1928
142) Who published the journal International
(C) 1930 classification?
(B) UNESCO
(B) ILA
(C) IASLIC (A) Library cooperation
(C)Library Management
(C) 1928
145)) Which law of library Science relates to
the growth of libraries (D) 1930
(C) LA
146) UAP stands for what of the following
(D) ILA
(A) United Academy of publication
(A) 1876
155) The first library school was started by
(B) 1872
(A) Melvin Dewey
(C) 1875
(B) Charles Williamson
(D) 1880
(C) John Macfarlane
(B) Bradford
162) World of learning is a what source of
(C) Grogan information
(B) Chennai
(B) USA
161) What is a Patent?
(C) Canada
(A) An agreement to the Government
(D) Thailand
(B) Document of the library
(C) J. D. Brown
167) Who is the editor of “Library Herald”
(D) Krishan Kumar
(A) Krishan Kumar
(B) C. K. Sharma
171) Indian national Bibliographical first
(C) S. R. Ranganathan appeared in
(B) 1957
(B) J. D. Brown
172) Who is the author of “Dictionary of
(C) H. W. Wilson anonymous and pseudonymous literature”
(C) Vivisimo
173) Compton year book contains
(D) Entireweb
(A) Political events
(B) Secondary
(B) 1975
178) Reference sources are those
(C) 1984
(A) Which are large in size?
(D) 1985
(B) Which are read at home easily?
(B) Humbul
179) Who is the publisher of Encyclopedia
(C) Sapling of Library and information science?
(A) Macropaedia
(C ) ICSU
187) Which of the following is not the (C) Non- Documentary source
documents?
(D) Both the Documentary and Non-
(A) Manuscript Documentary sources
(B) Book
(B) Gazetteer
189) What are non- documentary sources?
(C) Encyclopedia
(A) Which are in printed form?
(D) Year book
(B) Which are in not printed form?
(A) Atlas
190) Today which type of information
sources is most useful? (B) Gazetteer
(C) 28 Volumes
(A) Directory
(C) Thesis
195) What do you call a collection of maps,
tables, charts, etc.? (D) Text book
(A) Globe
(C) Annually
196) How many volumes Micropaedia of
new Encyclopedia Britannica is published? (D) Quarterly
(A) 2
(A) Quarterly
(B) Fortnightly
(C) Monthly
(A) CAS
203) The term “Information Service” is an
improvised name … (B) Information retrieval
(C) Bibliography
(C) Both
209) Feedback mechanism is a part of which
service? (D) None
(A) 1987
220) How many Auxiliary tables are there in
(B) 1967 DDC 23rd Edition
(C) 7
(C) 1933
218) Who enunciated the five fundamental
categories (D) 1944
(C) 1874
(D) 1894
224) In which year DDC 23rd edition was
published
(D) C. A. Cutter
225) The word classification comes from the
Latin word
(D) Library
(B) 1960
(B) DDC 15
231) What are the four entity of FRBR
model? (C) DDC 16
(C) E.B.Ross
233) When was the different typological
study towards mode of formation of subjects (D) Melvin Dewey
done?
(A) 1950
237) The Dewey Decimal Classification (C) Book Number
divides human knowledge into
(D) Class number
(A) 10 basic categories.
(C) Both (A) and (B) are true + collection 243) Who is the Editor in Chief of 21st
number Edition of DDC
(C) E.Mayo
(A) 1950
(C) 15
(D) Staffing
253) CPM (Critical Path Method) is
developed by
(A) 10
258) Zero Base Budgeting system was
(B) 8 propounded by
(C) E.Mayo
(D) Pter Phyrr 262) Financial support given to libraries are
of two types - Recurring and
(A) Ad-hoc
259) When Zero Base Budgeting system
was first prepared (B) Endowments
(C)1970
(C) Deployment
(C) Organization
265) A budget which mainly covers items of
(D) Government current revenue and expenditure is called __.
(B) Non-recurring
(B) 1896
268) Scrutiny of financial transactions is
called (C) 1899
(B) Programming
(D) Taylor
(D) S. R. Ranganathan
(A) Henri Foyal 285) What are the standard size of the
Accession Register is
(B) Luther Gulick
(A) 16” * 12”
(C) Herbert
(B) 16” * 13”
(D) Elizabeth stone
(C) 16” * 11”
(A) CPM
286) A good library building is an outcome
(B) POSDCORB of librarian and.
(B) Library reference service 287) ________ are the storage areas for the
various types of documents kept in a library.
(C) Library administration
(A) Tasks .
(D) Library automation
(B). Racks
(C) Stacks 291)…………… categorises documents into
three types such as primary, secondary and
(D) Desks tertiary.
(A) Grogan
(C) Women
292) ________ is a legal document and can
(D) Researchers be used as a source of industrial information.
(A) Report
(A) Bibliography
290) Information Gatekeepers come under
________ sources. (B) Introduction Part
(C) Institutional
(A) Maximum
(B) Medium
(A) KARDEX
(C)Cataloguing
299) Technical section performs mainly two
(D) Arrangement in the shelve functions namely classification and
(A) Accessioning
(C)12” x 5”
300) PRECIS was developed by Derek
(D) 5” x 3” Austin for use in the
(A) BNB
(C) Reserving
305) The objective of library binding is
(D) Discharging ________of the library materials.
(D) Shifting
307) Sheets before and after the text of a
book are called _________. .
304) Outdated and seldom used books are (A) End papers
withdrawn from the library is known as
___________. (B) Attach cover
(C) BLA
(B) 1965
319) In fund accounting, _______ fund
(C) 1975 cannot be used for other purposes.
(B) Non-recurring
(B) Programming
(A) Formula
(D) Organization
(A) Manipur
(B) Imitation
(B) ALA .
(B) INSDOC
334) ________ is a process of helping
(C) DRTC employees in an organization to acquire new
skills and competence on a continuing basis
(D) UGC.
(A) Total Quality Management
(B) Second
(A) RDF
340) Computer memory is measured in
(B) Ontologies ____________________
(C) Megabytes
337) World Wide Web (WWW) was first (D) All of the above
designed by whom?
343) What are three types of basic languages (C) Message switching
used in computer programming?
(D) None of the above
(A) Zero, low and high levels
(C) WordStar
344) When CD-ROM was prepared and
made? (D) CDS/ISIS
(A) 1985
(C) WAN
345) In how many ways switching system
can be established? (D) IN
(A) Two
349) Who designed analytical engine?
(B) Pascal
(B) 526
352) Which is not a programming language?
(C) 265
(A) FORTRAN
(D) 254
(B) BASIC
(C) COBOL
356) Raw, unevaluated, unprocessed and
(D) ASCII unorganized facts is known as:
(A) Data
(C) Coordination
357) INTERNET was initially developed by
US Department of (D) Classified bibliography
(A) Commerce
359) An University providing Open Access (D) Multi user operating system
to Sanskrit dissertations through Internet
(C) TCP/IP
(A) E-mail
(C) SLIM++
366) Following is not a social bookmarking
site: (D) SOUL
(A) Digg
(A) Personal Digital Assistance 375) Who invented OSI Model in 1982
372) PLONE is a:
(A) Content Mnagement System 376) Where ISDN was first started in 1990
(D) Singapore
(D) 2
374) Following is an example of
microblogging:
(A) Common Communication Format 383) What is the full form of ERNET?
(D) INFLIBNET
(D) IASLIC
382) Resource sharing is a part of …
(C) Interlending and Document supply
(A) JCCC
(C) A LIbrary
(A) Nature
391) What is e-prints ?
(B) Blackwell
(A) A catalogue
(C) ISID
(B) A journal
(D) Springer
(C) A repository Software
(D) An encyclopeadia
388) Virtua accomadates Different version
of the MARC Standard?
(D) Library Management Software 397) Mean, Median and Mode are :
(D) Searching for solutions to the problem 404) Which of the following variables
cannot be expressed in quantitative terms?
(B) Useability
(D) RRRLF
(B) Powell
410) Where is the headquarter of RRRLF?
(C) Sherwell
(A) Banglore
(D) H. G. Wells
(B) Delhi
(C) Calcutta
414) ”A library is a public institution or
(D) Lucknow establishment charged with the care of
collection of books, the duty of making them
accessible to those who require the use of
them and the task of converting every 417) Reading centre’s, story hours,
person in its neighborhood into a habitual exhibitions and reading to literature are
library goers and reader of books.”Quoted forms of …
by whom?
(A) Extension service
(A) Dr S R Ranganathan
(B) Service of a public library
(B) K.N.Raj
(C) Both
(C) C.A.Cutter
(D) None
(D) W.C.Sayers
(C) J.D.Brown
(A) Acquisition
(C) Computers
423) The process of configuring the disk
into tracks and sector is called- (D) None of the above
(A) Booting
(C) DELL
(A) System
432) Information is…..
(B) Network
(A) Raw Data
(C) Website
(B) Processed Data
(D) Database
(C) Input data
(D) ALA
430) What is Bibliometry ?
(C) Secondary
(D) Tertiary (B) List of words in a language
435) Rules for dictionary catalogue were (D) Alphabetical index to passages of work
devised by :
(A) A. Pannizzi
439) One of the following search engine is
(B) C. C. Jewet exclusively meant for scientific information
:
(C) S. Lubetzky
(A) Google
(D) C. A. Cutter
(B) Yahoo
(C) SCIRUS
436) RSS feed is a tool of :
(D) Altavista
(A) Graphic design
(C) Encyclopedia
441) Who among the following honoured
(D) Dictionary with ‘Nobel Prize’ for his substantial
contribution in Documentation ?
(A) S. C. Bradford
438) Glossary is a :
(B) Loosjes
(A) List of technical words with
definitions (C) Eric De Grolier
(D) Henri La Fontaine (B) Graphic User Interaction
442) The Farmington plan is associated with (D) Great Union of India
:
(D) Documentation
443) UNESCO assisted Model Public
Library in India is located at :
(D) Nagpur
444) Mark the ‘odd one out’ :
(B) Current Communication Format 454) Who enunciated the term ‘hypertext’ ?
(A) Precision
456) IFLA took up the “Universal
(B) Recall Availability of Publication” program in the
year............... .
(C) Relevant information
(A) 1973 (C) Current online patent in science and
technology
(B) 1976
(D) Contents of periodicals in science and
(C) 1972 technology
(D) 1970
(D) ALA
461) Tagging in web 2.0 application is
called :
(D) ISBD can replace cataloguing rules 462) Inductive logic proceeds from :
(B) Classification Research Group 467) Which of the following is not covered
under Intellectual Property Rights ?
(C) Committee for Ranganathan Guild
(A) Copyrights
(D) Classic Research Grant
(B) Patents
466) The oldest and the largest Library (C) A web browser
Association in the world is............. .
(D) A search engine
(A) ALA
(B) LA
470) The concept of concretes and processes
(C) IFLA was given by.............. .
(A) Kaiser
(C) Thomson
471) Chairman of National Knowledge
Commission is............... . (D) Elsevier
(B) O. S. dependent
476. Which of the following is an
(C) Machine independent ‘Acronym’ ?
(B) UNO
(B) Feedback
477) A set of rules that govern overall data
(C) Medium communications system is popularly known
as............... .
(D) Source
(A) Protocol
(B) Agreement (C) Agency of the names of translation
experts
(C) Pact
(D) None of these.
(D) Memorandum
(C) They are publications of serial nature (D) Library is separate from a system.
(B) The forces governing the flow of 488) MeSH is the name of a
information
(A) Medical Library
(C) The means for processing of information
for optimal uses (B) C.S.I.R. Unit
(A) A Bibliographer
490) In which year did A. W. Borden start a
(B) A Book Lover refresher course for librarians in India ?
(C) 1912
(A) Theory X and Theory Y 495) Who contributed on the systematic use
of user's education ?
(B) Hierarchy of human needs
(A) S.S.Green
(C) 14 principles
(B) Melvil Dewey
(D) Hygienic factors.
(C) E. J. Coates
(A) KOHA
(C) 1952
494) What is Delphi method ?
(D) 1972.
(A) It is a programming language
(C) 8-bytes
(B) OCLC
(C) IFLA
(D) UNESCO.
Multiple Choices Questions and Answers 1-500
These questions and answers are compiled by Dr. Dr. Badan Barman
Mistake in answer, duplication in questions and other errors should be reported to Dr. Badan
Barman at badanbarman at gmail dot com.
6) The Delivery of Books (Public Libraries) Act, 1954 was not implemented in
(A) Assam
(B) Jammu and Kashmir
(C) Haryana
(D) Delhi
8) According to General Financial Rules, 2005, loss of how many volumes per thousand volumes
issued / consulted in a year is to be taken as reasonable.
(A) Three
(B) Four
(C) Five
(D) Six
9) According to Ranganathan, many collections lose its relevance in how many years?
(A) 20 years.
(B) 30 years
(C) 40 Years
(D) 50 years.
10) Annual withdrawals from the collection should average at least how many percent of the total
collection.
(A) 5%
(B) 10%
(C) 15%
(D) 20%
28) Berne Convention and Universal Copyright Convention was revised in Paris in
(A) 1949
(B) 1952
(C) 1971
(D) 1931
33) C. W. Hanson
(A) Categorized information need into current approach, everyday approach, and exhaustive
approach.
(B) Divides documentary sources of information into primary and secondary.
(C) Divides documentary sources of information into primary, secondary and tertiary.
(D) Classified documentary sources of information into Conventional, Neo Conventional, Non
Conventional and meta document.
34) The First and Oldest University Library was established in British India at
(A) University of Delhi
(B) Calcutta University
(C) Aligarh Muslim University
(D) University of Madras
71) Who had given the Minimal, Middling and Maximum theories of reference service?
(A) C. M. Winchell
(B) S. R. Ranganathan
(C) James I Wyer
(D) Samuel Rothstein
80) First time efforts for the development of libraries in India were made
(A) S. R. Ranganathan
(B) S. Radhakrishnan
(C) Sayaji Rao Gaekwad I
(D) Sayaji Rao Gaekwad III
82) Who propounded “Conservative, moderate and liberal theories of reference service” ?
(A) William A Katz
(B) S. R. Ranganathan
(C) James I. Wyer
(D) R. Emery
85) The simple Dublin Core Metadata Element Set (DCMES) consists of
(A) 10 elements
(B) 15 elements
(C) 14 elements
(D) 18 elements
Motivation theories
90) INSDOC has been merged with NISCOM and is now known as
(A) DELNET
(B) NISCAIR
(C) DESIDOC
(D) NASSDOC
National Institute of Science Communication and Information Resources (NISCAIR) came into existence
on 30 September 2002 with the merger of National Institute of Science Communication (NISCOM:1996)
and Indian National Scientific Documentation Centre (INSDOC:1952). Both NISCOM and INSDOC, the two
premier institutes of the Council of Scientific and Industrial Research (CSIR), were devoted to
dissemination and documentation of S&T information.
96) Number of States in India which have enacted Public Library Legislation till date is
(A) Eighteen /Nineteen
(B) Fourteen
(C) Thirteen
(D) Sixteen
98) JSTOR(1995) is an online system for archiving and accessing academic journals. It is located
in
(A) Germany
(B) UK
(C) USA
(D) Budapest
JSTOR was conceived by The Andrew W. Mellon Foundation to help university and college
libraries struggling to provide adequate space for an ever-growing amount of published
scholarship. In 1995, JSTOR was founded as a shared digital library to help academic institutions
save costs associated with the storage of library materials and to vastly improve access to
scholarship. JSTOR merged with and became of service of ITHAKA (ithaka.org) in 2009, a
not-for-profit organization that also includes Portico (portico.org) and Ithaka S+R
(ithaka.org/ithaka-s-r).
These questions and answers are compiled by Dr. Dr. Badan Barman, Mayank Yuvaraj, Md.
Iliyas Kakandikar, Miss. Kankana Baishya, Mrs. Anupama Chetia, Ms. Krishna Roshan, N.
Muthukumaran, S. Chellapandian and Vaibhavi Thacker.
Mistake in answer, duplication in questions and other errors should be reported to Dr. Badan
Barman at badanbarman at gmail dot com.
101) Information is …
WIPO
WIPO Lex is a one-stop search facility for national laws and treaties on intellectual property (IP) of
WIPO, WTO and UN Members
(A) Translations
(B) Copyright
(C) Patent
(D) Standards
The Indian Copyright Act, 1957 governs the system of copyrights in India. Copyright Law in
the country was governed by the Copyright Act of 1914, was essentially the extension of the
British Copyright Act, 1911 to India,and borrowed extensively from the new Copyright Act of
the United Kingdom of 1956. Now Indian Copyright is governed by the Indian Copyright Act,
1957.[1]
The Indian Copyright Act today is compliant with most international conventions and treaties in
the field of copyrights. India is a member of the Berne Convention of 1886 (as modified at Paris
in 1971), the Universal Copyright Convention of 1951 and the Agreement on Trade Related
Aspects of Intellectual Property Rights (TRIPS) Agreement of 1995.
Though India is not a member of the Rome Convention of 1961, WIPO Copyrights Treaty
(WCT) and the WIPO Performances and Phonograms Treaty (WPPT),the Copyright Act is
compliant with it.[2]
107) Which one of the following is not associated with the communication system?
(A) Receiver
(B) Channel
(C) Sender
(D) Entropy
Mike Bergman, founder of BrightPlanet,[1] credited with coining the phrase DEEP WEB.
(A) B. S. Jha
(B) K. P. Sinha
(C) S. Mudaliar
(D) C. D. Deshmukh
110) Which organisation applied Library and Information Policy in India at national level.
(A) NISSAT
(B) INSDOC
(C) UNESCO
(D) RRRLF
(A) Pune
(B) Mumbai
(C) Nagpur
(D) Delhi
112) The act enacted in India in 1856 on Intellectual Property Right was based on.
(A) No
(C) Yes
(A) Greek
(C) German
(D) French
(A) Ranganathan
(B) J. Martin
(C) Beesman
(D) Calvin Moores
116) To which country the credit is given to coin the term information society?
(A) USA
(B) France
(C) Japan
(D) India
(A) Wealth
(B) Commodity
(C) Products
(A) Bit
(B) Byte
(C) Gram
(D) Hertz
(A) 1963
(B) 1972
(C) 1960
(D) 1954
120) Now a day’s what is a most important vital resource for societal development of a country ?
(A) Books
(B) Kowledge
(C) Information
(D) Data
122) When was Dr. S. R. Ranganathan was appointed as a National research professor of Library
science
(A) 1942
(B) 1962
(C) 1972
(D) 1952
123) Which Indian University first started M.Lib.Sc. & M.Phil courses
(A) University of Delhi
124) Which Commission recommended 10% of the total college budget for development of
Libraries?
125) UNISIST is a
(A) Software
(B) A Programme
(D) A committee
126) Where did Dr. S. R. Ranganathan put forth his five laws of library science?
(A) 1952
(B) 1955
(C) 1957
(D) 1965
128) In which year ASLIB was acquired by MCB group, the holding company for emerald group
publishing?
(A) 2003
(B) 2005
(C) 2009
(D) 2010
(A) IFLA
(B) ASLIB: The Association for Information Management: founded in 1924 as the
Association of Special Libraries and Information Bureaux: Rebecca was
appointed to the position of Director for ASLIB in January 2011
(C) ALA
(D) LC
(A) SLA
(B) IFLA
(C) ALA
(D) COMLA
(A) 1931
(B) 1934
(C) 1940
(D) 1945
132) Which organization has introduced the concept of “Sister libraries” for children`s and
young adults reading?
(A) UNESCO
(B) IFLA
(C) LC
(D) LA
133) In which year the ISBN allocation office in India shifted from Kolkatta to Delhi?
(A) 2009
(B) 2010
(C) 2011
(D) 2012
134) Which two organizations jointly publish survey on digitization and preservation?
(D) IFLA + LC
136) Which organization was joined with Library Association to form CILIP in 2002?
(A) 1931
(B) 1937
(C) 1945
(D) 1948
138) In which year headquarter of FID was shifted from Brussels to The Hague?
(A) 1925
(B) 1928
(C) 1930
(D) 1934
139) Who gave the sixth law of library science “Every reader his/her freedom”?
(A) Taxila
(B) Nalanda
(C) Vallabhi
(D) Sravasti
(A) 1988-89
(B) 1990-93
(C) 1994-97
(D) 1999-02
(A) IFLA
(B) UNESCO
(D) ALA
(A) IATLIS
(B) ILA
(C) IASLIC
(D) SIS
144) Where is the headquarter of SLA?
(B) Lagos
(C) Shimla
IFLA:Strategic Activities
(B)Library Administration
(C)Library Management
(D)Library Cataloging
148) The five laws of Library Science published in the book form in the year
(A) 1924
(B) 1931
(C) 1928
(D) 1930
(A) ALA
(B) IASLIC
(C) LA
(D) ILA
(A) 1876
(B) 1872
(C) 1875
(D) 1880
152) Which term was coined by Dr. S. R. Ranganathan for mobile libraries?
(D) All
(A) H. W. Wilson
(B) R. R. Bowker
158) Who categorized information source into conventional, non conventional, neo conventional
and micro documents:
(A) Ranganathan
(B) Bradford
(C) Grogan
(D) Henson
(B) Chennai
(C) Bombay
(A) India
(B) USA
(C) Canada
(D) Thailand
(A) London
(C) Calcutta
(D) Chicago
(B) Keesing’s
(B) C. K. Sharma
(C) S. R. Ranganathan
168) Who was Published the monthly Journal “The Library World’
(B) J. D. Brown
(C) H. W. Wilson
(D) K. Navlavi
(C) J. D. Brown
(A) 1947
(B) 1957
(C) 1967
(D) 1937
(A) 1965
(B) 1975
(C) 1984
(D) 1985
(A) Renardus
(B) Humbul
(C) Sapling
(D) EdWEb
(A) Mamma
(B) Dogpile
(C) Vivisimo
(D) Entireweb
(B) Secondary
(C) Tertiary
(A) Boweker
(C) M. Dekker
(D) H. W. Wilson
(C) CAS
(D) SDI
181) Which part of new encyclopedia Britannica is useful for ready references?
(A) Macropaedia
(B) Propaedia
(C) Micropaedia
(D) Premedia
(B) Annual
(C) Directory
(D) Dictionary
(B) Almanac
(B) LC
(C ) ICSU
(D) AGRIS
(A) Manuscript
(B) Book
(C) Inscription
(D) Periodical
188) Generally the information sources are divided mainly in to following categories?
192) What is the suitable reference sources to know about the information of a particular place?
(A) Directory
(B) Gazetteer
(C) Encyclopedia
193) What is the suitable reference sources to find out the list of historical monuments of Delhi?
(A) Atlas
(B) Gazetteer
(D) Globe
(A) Directory
(B) Encyclopedia
(C) Dictionary
(A) Globe
(B) Gazetteer
(C) Atlas
(D) Map
(A) 2
(B) 10
(C) 11
(D) 12
(A) 20 Volumes
(B) 25 Volumes
(C) 28 Volumes
(D) 30 Volumes
(A) Encyclopedia
(B) Digest
(C) Thesis
(A) Monthly
(B) Weekly
(C) Annually
(D) Quarterly
These questions and answers are compiled by Dr. Badan Barman, Ghante Pradipkumar. B.,
Mayank Yuvaraj, Ms. Krishna Roshan, N. Muthukumaran, Rajashekar M Patil, S.
Chellapandian, Vaibhavi Thacker.
Mistake in answer, duplication in questions and other errors should be reported to Dr. Badan
Barman at badanbarman at gmail dot com.
(A) Quarterly
(B) Monthly
(C) Weekly
(D) Annual
(B) Fortnightly
(C) Monthly
(D) Quarterly
(A) Administration
(B) Documentation
(C) Bibliography
204) Which terms was coined by S.R. Ranganathan for mobile libraries
(A) CAS
(C) SDI
(A) D J Fockett
(B) S R Ranganathan
(B) CAS
(D) SDI
212) Reading centre, story hours, exhibition and reading to literature are form of
(C) Both
(D) None
(B) C. A. Cutter
(D) K. N. Raj
(A) 1903
(B) 1897
(C) 1923
(D) 1933
(A) 1987
(B) 1967
(C) 1947
(D) 1968
MARC 21:1999(US,CAN&UNIMARC):LC
(D) W. C. Sayers
(A) J. D. Brown
(B) W. C. Sayers
220) How many Auxiliary tables are there in DDC 23rd Edition
(A) 16
(B) 6
(C) 7
(D) 8
(A) 1905
(B) 1931
(C) 1933
(D) 1944
(A) CC
(B) DDC
(C) UDC
(D) LCC
(A) 2000
(B) 2011
(C) 2003
(D) 2010
(A) Classis
(B) Classes
(C) Clauses
(D) Fiction
(B) 1876
(C) 1874
(D) 1896
(A) 1904
(B) 1901
(C) 1905
(D) 1894
(B) Brown
(C) H. W. Wilson
(D) C. A. Cutter
229) MESH is a
(A) Thesaurus
(B) Dictionary
(C) Journal
(D) Library
230) The First edition of DDC Consisted of
(C) 44 pages
233) When was the different typological study towards mode of formation of subjects done?
(A) 1950
(B) 1960
(C) 1970
(D) 1975
234) In which edition “Auxiliary table for area” was first introduced?
(A) DDC 14
(B) DDC 15
(C) DDC 16
(D) DDC 17
(C) E.B.Ross
(A) 1950
(B) 1960
(C) 1954
(D) 1964
(C) Mc Colvin
(D) Sayers
248) "To provide the best books to the maximum readers at the least cost" said by
(B) P. N. Kaula
(C) E.Mayo
(D) Mayo
(A) 10
(B) 9
(C) 15
(D) 13
(A) Staffing
(B) Directing
(C) Motivation
(D) Planning
(C) IIM
(D) IBM
(A) 10
(B) 8
(C) 13
(D) 15
(A) Cataloging
(B) Circulation
(A) Planning
(B) Motivation
(C) Directing
(D) Staffing
257) Which national agency in India is responsible for assigning the ISBN
(A) RRRLF
(B) BARC
(C) NCL
(C) E.Mayo
(A)1950
(B) 1960
(C)1970
(D) 1980
260) Posting the right person at the right place is called ________
(A) Recruitment
(B) Coaching
(C) Deployment
(D) Induction
(A) Customers
(B) Staff
(C) Organization
(D) Government
262) Financial support given to libraries are of two types - Recurring and
(A) Ad-hoc
(B) Endowments
(C) Annual
(D) Non-recurring
264) …….. takes items of expenditure for libraries as the working data for allocation of funds.
265) A budget which mainly covers items of current revenue and expenditure is called __.
(A) Senate
267) In fund accounting, _______ fund can not be used for other purposes.
(A) Recurring
(B) Non-recurring
(C) Restricted
(D) Encumbering
(A) Budgeting
(B) Programming
(C) Accounting
(D) Auditing
269) What are the two parts of the annual report of the library
(D) S. R. Ranganathan
(A) 1895
(B) 1896
(C) 1899
(D) 1875
273) When did electrically operated book charging system introduced first?
(A) 1926
(B) 1905
(C) 1933
(D) 1932
(A) 10
(B) 12
(C) 14
(D) 16
(A) 1958
(B) 1968
(C) 1955
(D) 1948
276) Who had invented the MBO?
(C) Budgeting
(D) Taylor
(A) Present
(B) Past
(C) Future
(B) Gulick
(C) Cutter
(C) Herbert
(A) CPM
(B) POSDCORB
(C) MBO
(D) HRM
(B) C. K. Sharma
(C) Cutter
(D) S. R. Ranganathan
(A) Registrar
(D) Architect
287) ________ are the storage areas for the various types of documents kept in a library.
(A) Tasks .
(B). Racks
(C) Stacks
(D) Desks
(A) Students
(B) Public
(C) Women
(D) Researchers
289) Library catalogue cards are filed in specially designed drawers called
(A) Documentary
(B) Human
(C) Institutional
(D) Neo-conventional
291)…………… categorises documents into three types such as primary, secondary and tertiary.
(A) Grogan
(B) Skeltor
(C)Dr. S. R. Ranganathan
(D) Hanson
292) ________ is a legal document and can be used as a source of industrial information.
(A) Report
(C) Patent
(D) Specification
(A) Bibliography
(C) Propaedia
(D) Micropaedia
294) One of the book selection principles states that “the best reading for the largest number at
the ……………Cost.”
(A) Maximum
(B) Medium
(C) Least
(D) Zero
295) Payments for the books purchased can be made only after
(A) Accessioning
(B) Classification
(C)Cataloguing
(B) 16 x 13”
(C)12” x 5”
(D) 5” x 3”
298) The three card system introduced by Ranganathan are - (i) Register Card, (ii) Check Card,
and (iii)?
(A) KARDEX
(B) LINDEX
(A) Accessioning
(C) Cataloguing
(D) Shelving
(A) BNB
(B) INB
(C) ISBD
(D) ISBN
These questions and answers are compiled by Amit Kumar Singh, B. Asadullah, Dr. Badan
Barman, Kankana Baishya, Kusum Saini, Mayank Yuvaraj, N. Muthukumaran, Naheem K. T.,
Neena M G, O. P. Saini, R. Raman Nair, Rajashekhar M Patil, S. Chellapandian, Sambhunath
Sahoo, Sampada D., and Vaibhavi Thacker.
Mistake in answer, duplication in questions and other errors should be reported to Dr. Badan
Barman at badanbarman at gmail dot com.
301) Getting books back from the users and releasing the borrower’s ticket is known as
(A) Charging
(B) Holding
(C) Reserving
(D) Discharging
302) While entering the library, the personal belongings of a reader is kept in ________
303) Books misplaced on the shelves by readers are restored. This work is referred to as.
(A) Shelving
(D) Shifting
304) Outdated and seldom used books are withdrawn from the library is known as ___________.
(A) Shelving
(B) Weeding
(C) Circulating
(D) Guiding
(B) Accessibility.
(C) Durability
(D) Humidity control
306) All part and pages of a volume are correctly sequenced in the first stage of binding
(A) Sewing
(B) Guard
(C) Pulling
(D) Collation
307) Sheets before and after the text of a book are called _________. .
(D) Gilding
308) Leather being used as one of the binding materials i.e., _________ is the strongest
leather.
(A) Roan
(B) Imitation
(B) ALA
(C) BLA
(D) NBT
310) A skillful method of providing means mechanism and structural elements to.
(C) J. C. Brunet
(D) A. C. Fosket.
(D) G. Gerbner
313) ISBN changed from 10 digits to 13 from
SBN:1966, ISBN (10):1970 by ISO (ISO:2018), Currently, the ISO's TC 46/SC 9 is responsible for
the ISBN. The ISO on-line facility only refers back to 1978.[5] Since 1 January 2007, ISBNs have contained
13 digits, a format that is compatible with Bookland EAN-13s.
1. An International Standard Book Number consists of 4 or 5 parts: for a 13-digit ISBN, a GS1
prefix: 978 or 979 (indicating the industry; in this case, 978 denotes book publishing)[9]
2. the group identifier, (language-sharing country group)[10]
3. the publisher code,[11]
4. the item number (title of the book),[11] and
5. a checksum character or check digit.[11]
(B) 1965
(C) 1975
(D) 1985
317)_______ budgeting does not take into account what happened in the past but emphasizes on
current activities.
(A) Formula
(B) Performance
(C) Programme
(D) Zero-base
(A) Senate
319) In fund accounting, _______ fund cannot be used for other purposes.
(A) Recurring
(B) Non-recurring
(C) Restricted
(D) Encumbering
(A) Budgeting
(B) Programming
(C) Accounting
(D) Auditing
323 There are a few basic factors which may be applied in winning the hearts of the readers.
They are
324) Physical condition of the books should be property maintaine(D) This is known as
(A) Collation.
(B) Conservation
(C) Shelf-arrangement
(D) Organization
325) ________ is an important record of books, which shows the position of any book on the
shelves.
326) Three great achievements in U.S.A. were noticed i.e. enunciation of DDC classification
scheme, formation of American Library Association and the publication of 1st Journal of the
librarianship in the year
(A) 1857
(B) 1859
(C) 1876
(D) 1901.
327) Books lost from the library are known through ________
(A) Manipur
(Dl Canada.
329) Of the following libraries in India, which one is the oldest library ?
330) The first centre to use computer in the library and information activities in India is
(A) DESIDOC
(B) INSDOC
(C) DRTC
(D) UGC.
331) Sheets before and after the text of a book are called _________.
(D) Gilding
332) Leather being used as one of the binding materials i.e., _________ is the strongest leather.
(A) Roan
(B) Imitation
(A) ILA
(B) ALA .
(C) BLA
(D) NBT
334) ________ is a process of helping employees in an organization to acquire new skills and
competence on a continuing basis
335) A skillful method of providing means, mechanism and structural elements to streamline
organizational work is known as _______
(A) RDF
(B) Ontologies
(D) URI
(A) First
(B) Second
(C) Third
(D) Fourth
(A) Bytes
(B) Kilobytes
(C) Megabytes
(D) J. C. Kith
343) What are three types of basic languages used in computer programming?
(A) 1985
(B) 1982
(C) 1980
(D) 1977
(A) Two
(B) Three
(C) Five
(D) Seven
(A) DBASE
(B) LIBSYS
(C) WordStar
(D) CDS/ISIS
(A) LAN
(B) MAN
(C) WAN
(D) IN
(B) Pascal
(D) Boyl
(B) Pascal
(D) Boyl
(A) FORTRAN
(B) BASIC
(C) COBOL
(D) ASCII
(A) 256
(B) 526
(C) 265
(D) 254
(A) Data
(B) Information
(C) Knowledge
(D) Wisdom
(A) Commerce
(B) Defense
(C) Interior
(D) State
358) Information retrieval is fastest from
(A) Budgeting
(C) Coordination
(A) Garfield
362) UNIX is a
364) LYCOS is a
(C) Database
(A) E-mail
(B) Internet
(C) US Mail
(D) UPS
(A) Digg
(B) Delicious
(C) Sqidoo
(D) Facebook
(A) HTTP
(B) SMTP
(C) TCP/IP
(D) Z39.50
(A) Koha
(B) VTLS
(C) SLIM++
(D) SOUL
(A) Blog
(B) Facebook
372) PLONE is a:
(C) ILMS
(B) Sony
(C) Infibeam
(D) Nokia
(A) Wordpress
(B) Blogspot
(C) Livejournal
(D) Twitter
(A) BSO
(B) ISI
(A) USA
(B) UK
(C) India
(D) Singapore
377) Now-a-days how many tipes of Protocol are used ?
(A) 5
(B) 4
(C) 3
(D) 2
378) Which type of protocol is used by interface for public data network(PDN) ?
(A) X.25
(B) X.12
(C) X.13
(D) X.20
(A) Ahmedabad
(C) Bangalore
(D) Chennai
384) Which network in India provided the first e-mail service in the country?
(A) NICNET
(B) DELNET
(C) ERNET
(D) INFLIBNET
(A) ILA
(B) INSDOC
(C) DRTC
(D) IASLIC
(A) JCCC
(B) ISID
(D) ACS
(A) Nature
(B) Blackwell
(C) ISID
(D) Springer
(A) USMARC
(B) UKMARC
(C) CANMARC
(A) Abacus
(A) A Magazine
(C) A LIbrary
(D) An Encyclopeadia
(A) A catalogue
(B) A journal
(D) An encyclopeadia
(A) E-Books
(B) E-Journals
(C) E-Theses
396) Questionnaire is a :
(A) Research method
399) Research is
These questions and answers are compiled by Dr. Badan Barman, O. P. Saini, Kankana Baishya,
Shradha Shukla, Vaibhavi Thacker, Md.Iliyas Kakandikar,and Pusparaj Naik.
Mistake in answer, duplication in questions and other errors should be reported to Dr. Badan
Barman at badanbarman at gmail dot com.
(A) Reliability
(B) Useability
(C) Objectivity
(A) D’space
(B) Windows
(C) Green-stone
(D) Linux
(A) 1970
(B) 1971
(C) 1972
(D) 1974
(A) Banglore
(B) Delhi
(C) Calcutta
(D) Lucknow
(A) Niscair
(B) Nissat
(C) Insdoc
(D) RRRLF
(A) ISSN
(B) ISBN
(C) CCF
(D) MARC
413) ”It is a library with little or no physical presence of books, periodicals, reading space or
support staff, but are that disseminate disseminate selective information directly to distribute
library customers, usually electronically”. Said by whom?
(B) Powell
(C) Sherwell
(D) H. G. Wells
414) ”A library is a public institution or establishment charged with the care of collection of
books, the duty of making them accessible to those who require the use of them and the task of
converting every person in its neighborhood into a habitual library goers and reader of
books.”Quoted by whom?
(A) Dr S R Ranganathan
(B) K.N.Raj
(C) C.A.Cutter
(D) W.C.Sayers
(A) IFLA
(B) UNISIST
(C) UNESCO
(D) INSDOC
416) ”Special libraries serve a specialist clientele, located within a single establishment or group
and all engaged in working towards one common purpose.” Who said this
(A) R.Astall
(B) UNESCO
(C) J.D.Brown
(D) E.C.Richardson
417) Reading centre’s, story hours, exhibitions and reading to literature are forms of …
(C) Both
(D) None
418) Which library first introduced the printed catalog
(A) Acquisition
(D) OPAC
423) The process of configuring the disk into tracks and sector is called-
(A) Booting
(B) Labelling
(C) Formatting
(A) INIS
(B) AGRIS
(D) MEDLINE
(A) D’space
(B) Window
(A) Books
(B) CD-ROM
(C) Computers
(A) Reprography
(B) CAS
(D) SDI
(A) System
(B) Network
(C) Website
(D) Database
429) Which network in India provided the first e-mail service in the country ?
(A) NICNET
(B) ERNET
(C) INFLIBNET
(D) DELNET
(A) Microsoft
(B) IBM
(C) DELL
(D) Intel
433) Identify the association that has changed its original name :
(A) ILA
(B) SLA
(C) LA
(D) ALA
(A) Conventional
(B) Primary
(C) Secondary
(D) Tertiary
(A) A. Pannizzi
(B) C. C. Jewet
(C) S. Lubetzky
(D) C. A. Cutter
(D) Architecture
(B) Directory
(C) Encyclopedia
(D) Dictionary
438) Glossary is a :
439) One of the following search engine is exclusively meant for scientific information :
(A) Google
(B) Yahoo
(C) SCIRUS
(D) Altavista
(A) S. C. Bradford
(B) Loosjes
(A) Kolkata
(B) Delhi
(C) Mumbai
(D) Chennai
(A) Classification
(D) Documentation
(A) Mumbai
(C) Kolkata
(D) Nagpur
448) Questionnaire is a :
(A) Precision
(B) Recall
(C) Relevant information
(A) E. Garfield
456) IFLA took up the “Universal Availability of Publication” program in the year............... .
(A) 1973
(B) 1976
(C) 1972
(D) 1970
(A) IFLA
(B) UNESCO
(C) SLA
(D) ALA
(B) ISKO
(C) LA
(D) LC
(A) Taxonomy
(B) Folksonomy
(C) Syndication
(D) Directory
(C) Table
(D) Histogram
(C) Copyright
466) The oldest and the largest Library Association in the world is............. .
(A) ALA
(B) LA
(C) IFLA
(D) IASLIC
467) Which of the following is not covered under Intellectual Property Rights ?
(A) Copyrights
(B) Patents
(D) Thesaurus
468) Ontology is................. .
(A) Kaiser
(B) H. P. Luhn
(D) S. R. Ranganathan
(C) P. Chidambaram
(D) Sam Pitroda
(B) O. S. dependent
473) The transmission of receiver’s reaction back to the sender is known as................. .
(A) Noise
(B) Feedback
(C) Medium
(D) Source
(A) Emerald
(B) Springer
(C) Thomson
(D) Elsevier
(A) UNESCO
(B) UNO
(C) UNDP
(D) UGC
477) A set of rules that govern overall data communications system is popularly known
as............... .
(A) Protocol
(B) Agreement
(C) Pact
(D) Memorandum
(A) Physical
(B) Technical
(C) Human
(D) Financial
(A) Yes, it has various sections as sub-systems coordinating each other forming a system
483) The 'Five Laws of Library Science' propounded by Dr. S. R. Ranganathan, is which type of
research ?
(A) Applied research
(A) Communication
(B) Generation
(C) Storage
(A) A Bibliographer
(C) A Publisher
(D) F. W. Taylor.
490) In which year did A. W. Borden start a refresher course for librarians in India ?
(A) 1905
(B) 1910
(C) 1912
(D) 1913.
491) A. B. Maslow is related to
(C) 14 principles
(A) KOHA
(B) AVANT1
(D) Z.39.50
(C) It is a software
(D) It is used for cost-benefit analysis.
(A) S.S.Green
(C) E. J. Coates
496) Who said 'some books are to be tasted, others to be swallowed and some few to be chewed
and digested' ?
497) In which year was the International Book Year celebrated by UNESCO ?
(A) 1931
(B) 1947
(C) 1952
(D) 1972.
(C) 8-bytes
(B) OCLC
(C) IFLA
(D) UNESCO.
Herald of lis:
UDC IN 40 LANGUAGES
3. Let Us Sum Up: Prevention of deterioration measures significantly extends the usual life of
all types of documents and must need to be implemented. In doing so, the person concerned
should work with curators, recommending officers, and other preservation staff to make
decisions about binding, housing, and related matters.
Remedies against environmental damage of reading material include shielding from sunlight, air
conditioning and such others in all walk of the material such as in store, on display, or in transit.
The storage areas should be clean and clutter, dust, dirt etc should not be allowed to accumulate
within the storage areas. When the books are in the shelf, safe storage or use of proper storage
cabinet by way of keeping the valuable reading material in box and keeping documents in
between metal supporters provide protection against mechanical damage. It also helps the
document in being free from dust, dirt and direct exposure of light.
Insects, mold, rodents are dangerous for a document. Generally pests are attached by clutter and
the food remnants. So, eating, drinking etc should be prohibited in a place where collections are
kept. During cleanliness all necessary measures should be taken so that cleanliness itself does not
damage the fragile materials. In the library, disaster recovery plan should be put in place.
Repairing of document includes use of adhesive, repairing tears, etc. Tears in leaves can be
carefully aligned and repaired with the strips of Japanese paper and a starch paste or other
suitable adhesive that bears the quality of good conservative. This process should be followed by
binding. Generally library binding is considered good for many kinds of documents. The special
collection should be treated specially.
Because of the big volume of library material having chances of deteriorating widely,
diverse material and methods for preserving them involves considerable cost.
Web Directories
Web Directories: A web directory or link directory is a directory of Web sites by subject on the
World Wide Web which are most often created by humans. It specializes in linking to other web
sites and classifying and categorizing those links often with a description. Many large directories
include a keyword search option which usually eliminates the need to work through numerous
levels of topics and subtopics.
The earliest Subject Directory search engine which covered WWW sites worldwide was The
World Wide Web Virtual Library. It presented an alphabetical index of subjects and is based on
Library of Congress Classification System. The most successful subject directory as well as
subject directory search engine is probably Yahoo that was originated as a student run service,
but now a profitable commercial site. It uses its own classification system.
a) Types: A web directory can be a real web directory that deals with all resources in all types of
subject areas or it may only deal with the resources of a particular subject areas. In the latter case
it is more commonly known as subject directory.
i) Subject Directories: A subject directory is a catalogue of sites collected and organized by
humans in a specific subject only. Subject directories are often called subject "trees" because
they start with a few main categories and then branch out into subcategories, topics, and
subtopics.
ii) Subject Gateways: According to Place (2000), “Subject gateways are Internet- based services
designed to help the users locate high quality information that is available on the Internet. They
are, typically, data bases of detailed metadata (or catalogue) records which describes Internet
resources and offer a hyperlink to the resources.” Users can choose to either search the database
by keyword, or to browse the resources under subject headings”. Generally subject directory is
treated as a broader term than that of Subject Gateways.
b) Importance: Because humans organize the websites in subject directories and it covers only a
small fraction of the pages available on the web, one can often find a good starting point if the
topic is included. Directories are also useful for finding information on a topic when you don't
have a precise idea of what you need. They are also most effective for finding general
information on popular or scholarly subjects.
Subject directory search engines are trying to compete with search engines. Web directories such
as Yahoo and The Open Directory are, in a sense, the Internet equivalent of a public library and
differ from the search engine in its provision of browsing the resources by some categories.
c) Examples: The following are some of the popular web directories-
i) Yahoo! (http://in.dir.yahoo.com/): Yahoo! aims to be the biggest Internet directories, with a
high level of coverage and popular appeal as high priorities. It is an excellent site for finding
topics that appeal to the general public. Currently, a search in Yahoo is being passed to AltaVista.
However, people can still use its directory.
ii) Open Directory Project (http://dmoz.org/): Open Directory lists scholarly and popular
websites. The Open Directory Project, also known as Directory Mozilla (DMOZ), relies on a
volunteer work force of editors who, by selecting, classifying and cataloguing resources, are
trying to build the largest library on the Internet. Mozilla was an early name for the Netscape
Navigator Web browser. DMOZ is owned by Netscape Communications, but the information and
database are freely available to other companies. The raw open-source directory is used by
Google, Netscape Search, AOL Search, Lycos, HotBot, and DirectHit.
iii) BUBL Link (http://bubl.ac.uk/): BUBL Link uses the Dewey Decimal Classification
system as the primary organization structure for its catalogue of Internet resources. It carefully
selected and accurately catalogued many LIS resources. It was developed by Centre for Digital
Library Research, Department of Computer and Information Sciences, University of Strathclyde,
Livingstone Tower, 26 Richmond Street, Glasgow G1 1XH, Scotland.
iv) About.com: At About.com (http://www.about.com/) you’ll find a directory with a twist. Each
topic area has an assigned "Guide" responsible for writing articles and organizing links on the
topic.
The other web directories include Internet Public Library (http://www.ipl.org/), Librarians' Index
to the Internet (http://www.lii.org/), WWW Virtual Library (http://vlib.org/), Google directory
(http://directory.google.com/), Looksmart, etc..
The Internet Library for Librarians (http://www.itcompany.com/inforetriever/) is a subject
directory. UNESCO, IFLA, etc also have subject directories. Besides, many individual especially
LIS professional also develop their subject directories, but because of space, we cannot do justice
to all such sites.
Web 2.0
Web 2.0: Web 2.0 is a set of technologies and service that allows people to contribute as much as
they consume. The term “Web 2.0” was officially coined in 2004 by Dale Dougherty, a vice-
president of O’Reilly Media Inc., during a team discussion on a potential future conference about
the Web.
The web 2.0 technologies rely on user generated content and support the provision of interaction
among them. Some of the web 2.0 technologies are
Blog: It is a web-based publication consisting primarily of periodic articles normally in reverse
chronological order with reflections, comments, and often hyperlinks provided by the writer.
Bookmarking: It allows users to create lists of “bookmarks” or “favourites”, to store these
centrally on a remote service (rather than within the client browser) and to share them with
other users of the system. Examples include digg, del.icio.us, Netvouz, furl, Connectedy and
CiteULike.
Crowdsourcing: The term crowdsourcing was coined by Wired journalist Jeff Howe to
conceptualise a process of Web-based out-sourcing for the procurement of media content, small
tasks, even solutions to scientific problems from the crowd gathered on the Internet.
Folksonomy: The term folksonomy is generally acknowledged to have been coined by Thomas
Vander Wal. It is a collection of tags created by an individual for their own personal use.
Folksonomy is the result of personal free tagging of information and objects (anything with a
URL) for one’s own retrieval. Examples include discogs.com for music and LibraryThing.
Mashup: A mashup is an element that combines information from multiple systems using Web
Services to provide an aggregate service. Personal home pages are an example of a mashup that
combines information from disparate sources to a single, personalized web page. Eg. iGoogle
Page.
Podcasts: Podcasts are audio recordings, usually in MP3 format, of talks, interviews and
lectures, which can be played either on a desktop computer or on a wide range of handheld
MP3 devices.
RSS Feed Aggregation Tool: RSS feed aggregation tools gather information from diverse
sources across the Web and publish in one place.
RSS: RSS is a family of formats which allow users to find out about updates to the content of
RSS-enabled websites, blogs or podcasts without actually having to go and visit the site.
Social Network: A social network or online community is a web based service focuses on
building online communities of people who share interests and / or activities by a variety of
ways. Example. YouTube (video) Flickr (photographs) and Odeo (podcasts), Myspace, and
Facebook.
Tagging: A tag is a keyword that is added to a digital object (e.g. a website, picture or video
clip) to describe it, but not as part of a formal classification system.
Wiki: A wiki is a type of editable website that allows users to add, remove, or otherwise edit
and change most content very quickly and easily, sometimes without the need for registration
by using relatively easy to use wiki syntax
virtual Library: Virtual Reality (VR) is an illusive environment for the eyes, ears and other
sense organs where user can experience the real world in an artificially created
environment by the computer system. It is a state of real sensational feeling in an imaginary
environment. The environment is so perfectly created and highly stimulated that one can
experience just like a real situation but with a full control over the environment.
a) Definition: Virtual Library refers to the scientifically managed collection of information
resources and services on site as well as off site that are available in a virtual reality
environment and accessible electronically through the internet at any time from any
geographical location.Such type of library only exists in the networked environment, without
the physical existence of books or journals on the shelves.
Kay Gapen’s 1994 defines the Virtual Library as The concept of remote access to
the content and services of libraries and other information resources combining an onsite
collection of current and heavily used material in both print and electronic form, with an
electronic network that provide access to and delivery from external World Wide library and
commercial information and knowledge sources.
Powell 1994 defines Virtual Library as It is a library with little or no physical
presence of books, periodicals, reading space or support staff, but are that disseminate
selective information directly to distribute library customers, usually electronically.
An electronic library may or may not be virtual. Eg. If the holding of a library is
available in CD ROM, DVD ROM, etc. and these resources only can be accessed through a
stand alone computer but not through the internet or WAN, then it is termed as electronic
library and not as virtual library. Further the VL set up should give an illusive environment
of the real library world.
b) Characteristic of Virtual Library: The main characteristics of Virtual Library are as
follows-
i) Information sources should be stored in 3 D format, electronically.
ii) Library staff should be able to work in the library from any geographical location.
iii) Library Services such as union catalogue, OPAC, CAS, SDI, etc should be available at the
user desktop, itself.
iv) All resources should be accessible over Internet with effective Searching, Browsing and
Navigation options.
v) The library should be integrated with Bulletin Board, Blog, Email, Voice Mail, E-List, Audio
Conferencing, Video Conferencing, etc services.
vi) Constant training and retraining must be imparted both to the library staff as well as library
user to talk with the newly emerging technologies.
vii) It may or may not have a physical existence.
Sherwell (1997) describes the characteristic of Virtual Library as-
i) There is no corresponding physical collection.
ii) Documents will be available in electronic format.
iii) Documents are not stored in any one location.
iv) Documents can be accessed from any workstation.
v) Documents are retrieved and delivered as and when required and
vi) Effective search and Browse facility are available.
c) Technology behind Virtual Library: Creation of Virtual Library involves use of highly
sophisticated technology that includes:
i) Use of multimedia material for information storage.
ii) Use of 3D sound, 3D Graphics, 3D Photo, etc.
iii) Use of Voice Message, Audio Conferencing, Video Conferencing, etc by the library staff as
well as library user.
iv) Origin and Development of PC with VR technologies attached.
d) Facilities in a Virtual Library Setup: The virtual library to be functional, following
facilities need to be extended to the Library Staff
i) Computer Resources: In case any library staff is not in a position to procure the computer
resources to work from their home, it will be the responsibility of the library to provide the same
to him/her.
ii) Office Stationary: The library should provide the office stationary i.e Calculators, staplers,
Directory of Phone numbers of Library staff, Job Manual, etc. to the library staff at their homes.
iii) Arrangement of Online Meeting: Arrangement of online meeting at fixed hour of the day by
using Voice Mail, Audio Conferencing, Video Conferencing, etc that helps in live, two way
communications. In the virtual library setup, the following facilities need to be extended to the
Library Users-
i) Access to Information: Access to all information resources from any geographical location.
ii) PC equipped with VR Technologies: If the VL is a part of any physical library then attempt
should be made to provide in the library itself the user with PC that are equipped with VR
technologies such as Head-tracked HMDs (Head Mounted Display), Data Gloves, Gesture,
Trackers, etc. The monitor, keyboard, speaker, joystick, etc should also be compatible to VR set
up.
e) Advantages of Virtual Library: VL set up will help the administrative staff of the library to
appoint handicapped person, elderly and parents with young children, etc.
A virtual library setup will provide following advantages to the administrator-
i) Low Office Space: In VL setup the library staff hopes to work from their homes itself that will
eliminate the necessity of large office capacity, thereby reducing the cost involved in office rent
or library building or cost related to its future expansion.
ii) Reduce Work Stoppage: Holiday, different kind of bandh, storm, flood, hurricanes and like
other makes it impossible for the employees to travel to the workplace of the library resulting in
halt of every kind of library activities. The VL will eliminate such type of work stoppage. Even
in holiday, employees can spend their leisure time by working certain hours for the library.
The virtual library will have the following advantages for library staff-
i) No Physical Constraints of Workplace: The Library staff should be able to work from their
home or any other place convenient to them.
ii) Own Boss: Every one wants to be his/her own boss. VL will give the employees the freedom
to do their job according to their own method.
iii) Everything is Formal: VL will demand the instruction to be given by the boss or the librarian
in a formal way to his/her subordinate that hopes to achieve better management.
iv) Direct Communications: The direct communication through voice mail, video conferencing
helps to foster a sense of group belongingness among the library staff.
The library user will have the following advantages-
i) Distance Education: Individual member of the library can enter into the virtual mode and can
feel the real library environment i.e can see the reference librarian, can browse the card
catalogue, etc.
f) Disadvantages of Virtual Library: Some of the disadvantages of a virtual library are-
i) Sense of not Belongingness: In VL set up the employees will not come in direct contact with
their colleague, so they hope to lose the feeling of being an important part of the library.
ii) Fear of Job Loss: In VL set up; employees can easily sink in the idea that they are expandable
by thinking in mind that any body with a computer and modem can do their work. So, they will
hope to be the victim of fear of job loss.
iii) Low Moral: VL will not support the positive feed back that comes with face to face
interaction with superiors and peers.
iv) Demand more dedication from Library Staff: The employees of VL should be more sincere,
disciplined and dedicated than the employees of physical library set up as he/she must work
without any external supervision and motivation in most cases.
v) Family Tension: If family tension will find its entry into the life of telecommuters they will
not be able to escape from it at least for a few hours when they will be in the same environment,
resulting interruption will occur in the work. If the tension will be from spouse, then he/she may
also view the job as a working arrangement to avoid family responsibility.
vi) Hazardous Set Up: VL will give the environment where employees hope to be the sufferer of
eyesight loss, Arthritis, Nerve problem, etc.
Another disadvantage of VL is that any user with negative mind will be able to mislead the
library staff.
g) Conclusion: The word “Virtual Library” is displayed in different kinds of library websites,
but in reality a true VL is yet to be set up. But when it will be implemented it will help to extend
the sense so distantly that any one can do, learn or manipulate the things in reality. It will help us
to build a library environment that will be similar to our physical library but will be accessible
from distant location; one can just see the library just like using a microscope or telescope.
Verification of Bibliographic Details
Verification of Bibliographic Details: After entering the essential description in the book
selection card the description of the item should be verified by the library staff for its accuracy. If
the book selection card was filled in by the library staff, then this process is only to examine
where he/she correctly puts the details from the source document to the book selection card or
not. In case the book was recommended by the user the library staff can verify the details by the
following means
i) If any copy of the book is already available in the library, then the original copy can be
consulted for verification
ii) By consulting Bibliographies, Best Books Guides, Publisher’s Catalogues, Book
Reviewing periodicals.
iii) Verification of the details can also be done by consulting online citation analysis tools, online
databases, and other electronic resources like searching over Google search engine and so on.
After verification, the “verified” data should be included in the card.
1. Selection of Documents: Selection means taking into accounts the books that have been
identified and chosen by faculties or other library users. Out of these books the ones are
actually to be added to the collection(s) are selected. In this step, preliminary checking
should be done so that the items available in the library or those on order do not get
selected. The checking should be done with order tray, bills awaiting payment, public
catalogue (i.e OPAC), etc. If the sufficient number of copies of the book are already in
the available collection then these titles should be rejected. If the present budget cannot
accommodate the cost of the item, then the item may be deferred for acquisition or
otherwise it may be purchased.
In many libraries, there is a book selection committee that consists of the librarian, library
staff, subject experts, board of management, and representative from users, volunteers,
friends, and patrons of the library. The ultimate responsibility for book selection rests
with the librarian. The acquisition staff is there to help him/her.
2. Mode of Collection Development: The following mode of collection development may be
used by a library after the selection of the document-
i) Gift: A library may acquire material by gift. If serious efforts are made a library may succeed
in acquiring rare and special books from the individuals;
ii) Exchange: Certain materials are not available for purchase. Such materials may have to be
acquired by exchange with other institutional publications;
iii) Membership: Sometimes a library or its parent body becomes a member of society or
organization whereby it might be possible to get certain materials free of charge or at a cost
lower than the usual.
iv) Purchase: A document should be purchased if it cannot be acquired by exchange or gift or by
virtue of membership.
Universal Machine Readable Catalogue (UNIMARC)
Universal Machine Readable Catalogue (UNIMARC): There emerged a number of standard
bibliographic record formats such as UKMARC, INTERMARC, USMARC, etc whose paths
diverged owing to different national cataloguing practices and requirements. Since the early
1970s, an extended family of more than 20 MARC formats has grown up. To greater or lesser
degrees almost all formats are compatible but the differences in data content mean that editing is
required before records are exchanged. Recognizing that there is a need for the establishment of
international format for the exchange of bibliographic data, IFLA, the section on cataloguing and
mechanization, took the initiative to develop international MARC format which would accept the
record created in any MARC format. As a result, the first version of Universal Machine Readable
Catalogue (UNIMARC) appeared for monograph and serial in 1977 to facilitate the international
exchange of bibliographic data in machine readable form.
UNIMARC follows the ISO communication format ISO-2709 (1981).
Besides MARC family of formats, there are other formats, notable among them being
AGRIS, International Nuclear Information System (INIS), UNISIST Reference Manual,
UNESCO’s CCF as a universal exchange format for bibliographical record.
Every national organization producing MARC records will produce them in the national
standard for use within the country and will reformat them according to UNIMARC format for
international exchange. So, after the development of UNIMARC each national agency would
need to write only two programmes- one to convert into a UNIMARC and the other to convert
from UNIMARC, instead of one programme for each other MARC format. Eg. INTERMARC
to UKMARC, USMARC to UKMARC, and so on.
a) UNIMARC Format: The UNIMARC format like any other version of MARC involves
three elements of the bibliographic record. These are-
i) Record Structure: The record structure is designed to control the representation of
data by storing it in the form of strings of characters known as fields. By record structure
various elements in a record structure are identified.
ii) Content Designation: Certain conventions are followed in order to identify the data
element within records. Such elements which include author, title and subject access are
further characterized. This supports the manipulation of the data for a variety of purposes.
iii) Data Content: The content is the data which is stored in the fields within the record.
Data can be coded data or bibliographic data.
b) Functional Block of UNIMARC: The fields which are identified by three character
numeric tags are arranged in functional blocks. These blocks organize the data according
to its function in a traditional catalogue record. The data element and content of the
record have been functionally divided into 10 different types of block. These are shown
below:
Block no Field tag Data Type Example
0 000-099 Identification Contains numbers that identify the
Block record.
Eg. 010 International Standard Book
Number.
1 100-199 Coded Contains fixed length data element
Information Block describing various aspect of the
record or data.
Eg. 101 Language of the work
2 200-299 Heading Block Contains the authority, reference or
general explanatory heading for
which records have been created.
Eg. 205 Edition statement
vi) It serve as a list of total document resource of libraries in a given geographical region.
4. Example: IndCat: Online Union Catalogue of Indian Universities, INFLIBNET, Available
over: http://indcat.inflibnet.ac.in/indcat/book.js
UGC-Infonet E-journal Consortium
UGC-Infonet E-journal Consortium: UGC-Infonet is an ambitious programme of UGC to
interlink all the Universities in the country with state-of-art technology. The access to e-journal
consortia was started in October 1, 2003 when the users started getting access to these resources
on trial basis for three months. The UGC-Infonet E-journal consortium was formally launched on
the concluding day of UGC’s Golden Jubilee celebrations by his Excellency the President of
India, Dr. A P J Abdul Kalam at Vigyan Bhawan on 28th December 2003. Access to various e-
journals formally began on January 1, 2004. The programme was set up by the Chairman, UGC
and it was the result of an understanding and co-operation between UGC, ERNET, the inter
university centre, INFLIBNET, national and international publisher, etc. The programme is
wholly funded by UGC and monitored by INFLIBNET centre, Ahmedabad. The Network is
being switched to BSNL backbone w.e.f 1st April 2010 and renamed as UGC Infonet 2.0. ON the
new scheme 10 Mbps(1:1) Leased line is being established in 180 plus universities preferably by
using Fiber to provide Internet Services.
a) Organization: The whole programme has been implemented in different phases. The UGC is
providing funds for the programme which will be cost free for the universities. INFLIBNET
Centre, an IUC of UGC, will subscribe resources based on the recommendations of National
Negotiating Committee set up by UGC in the 10th plan period. The universities have been funded
for connectivity under UGC-Infonet and will have network connectivity. Individual universities
will then have unique IP address through which access is given by the publisher for which
subscription is made. However, the entire programme will be ministered, monitored and
maintained by the INFLIBNET centre.
c) Membership: The universities covered under UGC are the primary beneficiaries. However,
this scheme will be extended to colleges very soon. The scheme is likely to be open to other
institutions such as ICAR and others after signing MOU with UGC/INFLIBNET.
So far 100 universities out of 171 Indian universities under the purview of UGC have
been provided access to these journals and it is gradually entering to the affiliated colleges as
well.
d) Functions and Activities: The consortium aims at covering all fields of learning of relevance
to various universities such as Arts, Humanities and Social Science to Computer and Pure
Science.
i) Access to Full text E-Resources: Under the consortium, about 4000 full text scholarly
electronic journals from 25 publishers across the globe can be accessed. The consortium provides
current as well as archival access to core and peer-reviewed journals in different disciplines. eg.
J-STOR (457) <http://www.jstor.org/>.
ii) Access to Bibliographic Database: It provides access to Analytical Abstracts, Biological
Abstracts, Catalysts & Catalysed Reactions, Chemical Abstracts Service, MathSciNet Database,
Royal Society of Chemistry, etc.
iii) Access to Portal: The gateway portals provides access to more than 10000 journals in the
area of Pure sciences, Social sciences and Humanities with contents and abstracts for major
collections. These gateway portals also provide customized solutions to access the full text for
the resources subscribed under UGC-Infonet to serve as “one stop shopping”. Examples of the
portal include Ingenta Gateway Portal <http://www.ingenta.com/>, and J-Gate Gateway Portal
<http://www.j-gate.informindia.co.in/>.
iv) Access to Open Access Resources: It provide access to BBS Prints Interactive Archive
<http://www.bbsonline.org/>, BioMed Central <http://www.biomedcentral.com/start.asp>,
Citebase <http://citebase.eprints.org/cgi-bin/search>, Citeseer <http://citeseer.nj.nec.com/cs>,
Cognitive Science <http://cogprints.ecs.soton.ac.uk/>, CogPrints <http://cogprints.org/>,
Directory of Open Access Journals <http://www.doaj.org>, Eprints.org archives
<http://software.eprints.org/>, Free Access Online Archives/ arXiv <http://arxiv.org/>, General
List of Open access eprints <http://dmoz.org/Science/Publications/Archives/>, HighWire Press
Free <http://highwire.stanford.edu/lists/freeart.dtl>, Networked Computer Science Technical
Reference Library <http://www.ncstrl.org>, CERN Document Server (CDS)
<http://weblib.cern.ch/>, Public Library of Science <http://www.plos.org/index.html>, PubMed
Central (PMC) <http://pubmedcentral.nih.gov/>, The Economics network (RePEc)
<http://repec.org/>, etc.
vi) Search and Browsing Facility: The list of journals covered in the scheme is updated
from time to time and is available on the INFLIBNET Centre’s website
<http://www.inflibnet.ac.in> under UGC-Infonet E-Journals Consortium category.
vii) Document Delivery Service: Though many journals are being considered for
subscription under consortium, copies of articles from many other titles which are not subscribed
under the consortium may be obtained from any participating library through Document Delivery
Service by sending the request.
The e-subscription initiative under UGC-Infonet is expected to trigger remarkable
increase in sharing of both print and electronic resources amongst the university libraries
through one of the gateway portals being identified. The gateway portals provide
customized solution not only to access the resources online but also access the resources
of other libraries participating in the consortium. The consortium headquarter
(INFLIBNET) is assigned to function as a resource centre with an aim to cater to the
needs of its members for resources not accessible to them in electronic media or are
available in print media. With subscribed resources accessible online in electronic format,
the member libraries would have less pressure on space requirement for storing and
managing print-based library resources. Moreover, all problems associated with print
media such as their wear and tear, location, shelving, binding, organizing, etc. would not
be an issue for electronic resources.
ICMR in the form of ICMR e-Consortia has been subscribing to the e-journals in a
consortia mode to all ICMR institutes. The Council also provides partial financial assistance for
organising Seminars/ Symposia/ Workshops.
Types of Research
Types of Research: The research can be categorized into the following types-
a) Basic Vs Applied: Fundamental research is also known as pure research, theoretical
research or basic research. It belongs to the domain of fundamental, intellectual, natural
problem and queries and hence is quite theoretical in nature and approach. According to
Pauline “gathering of knowledge for knowledge’s sake is termed pure or basic research”
i.e studies conducted to achieve a fuller understanding of a phenomena without
considering of how their findings will be applied belongs to basic research. Its major
preoccupation lies with designing the tools of analysis and with discovering universal
laws and theories. It may be note that the scope of the sphere of activity of basic research
is extraordinarily wide.
Research concerning some natural phenomena or relating to pure mathematics are
examples of fundamental research. Similarly research studies concerning human behavior
carried on with a view to make generalization about human behavior are also examples of
fundamental research. It is also widely used in the case of environment protection,
conflict resolution, crisis prevention, health pandemics, etc. Again basic research findings
can be subsequently used to enrich applied or strategic research.
“Basic research is necessary to develop and question concepts and theories and to bring
new perspectives into the development discourse”. It considers knowledge as an end in
itself, and the purpose is to discover the truth. There is no guarantee of short-term
practical gain from basic research that result in low rate of funding for basic research.
Applied research is pursued for some purpose outside of its own domain, either for an
immediate distinct utility or as an aid to the development of some other subject. Thus the
central aim of applied research is to discover a solution for some pressing practical
problems.
Applied research aims to provide knowledge on which the best decisions can be made
regarding the problem associated with serious risks which otherwise can cause disaster.
The objective of applied social research is to use data so that decisions can be made. Its
purpose is to understand the nature and sources of human and social problems. The
marketing research or evolution researches are examples of applied research.
b) Descriptive Vs. Analytical Research: Descriptive research includes surveys and fact
findings enquiries of different kind. It provides description of the conditions / existing
relationship / opinions held / process going on / effects evident / trend developing on the
present cases / event with relation to the past. In other words, descriptive studies are the
one whose purpose is to describe accurately the characteristic of a group. The major
purpose of descriptive research is description of the state of affair as it exists at present.
The main characteristic of this method is that the researcher has no control over the
variables. He can only report what happened or what is happening.
Descriptive Studies is used in the following cases-
i) While gathering empirical data regarding certain phenomena so as to interpret them in
a broader perspective of generalization;
ii) To study psychological phenomena of a group of individuals;
iii) To study relationship between variables under uncontrolled observation.
In analytical research, the researcher has to use facts or information already available and
analyze these to make a critical evaluation of the material.
b) Quantitative Vs. Qualitative Research: Quantitative research is based on the
measurement of quantity or amount. It is applicable to phenomena that can be expressed
in terms of quantity.
Qualitative research on the other hand is concerned with qualitative phenomena i.e. phenomena
relating to or involving quality or kind. Research design to find out, how people feel or what they
think about a particular subject or institution is a qualitative research. To apply qualitative
research in practice is relatively a difficult job and therefore one should seek guidance for
experimental psychologists.
c) Conceptual Vs. Empirical Research: Conceptual research is that related to some
abstract ideas or theory. It is generally used by philosopher and thinker to develop new concepts
or to reinterpret existing ones.
d) Empirical research relies on experience or observation alone, often without due respect
for system and theory. It is data based research coming up with conclusions which are capable of
being verified by observation or experiment.
e) Diagnostic Studies: The diagnostic study is concerned with the discovering and
testing certain variables with respect to their association or disassociation. It enquires into the
basic nature and cause of an existing problem. In its broadest sense, the diagnosis corresponds to
the fact finding aspect of the clinical practice.
Diagnostic Studies is applicable to the instances like solution of a specific problem by the
discovery of the relevant variables, discovering or analyzing a specific problem.
f) Explanatory Research: It structures and identifies new problems. Exploratory research
is a type of research conducted because a problem has not been clearly defined.
Exploratory research helps determine the best research design, data collection method
and selection of subjects. Given its fundamental nature, exploratory research often
concludes that a perceived problem does not actually exist. The objective of explanatory
research is the development of hypothesis rather than their testing.
Exploratory research often relies on secondary research such as reviewing available
literature and/or data, or qualitative approaches such as informal discussions with
consumers, employees, management or competitors, and more formal approaches through
in-depth interviews, focus groups, projective methods, case studies or pilot studies. The
Internet allows for research methods that are more interactive in nature: E.g., RSS feeds
efficiently supply researchers with up-to-date information; major search engine search
results may be sent by email to researchers by services such as Google Alerts;
comprehensive search results are tracked over lengthy periods of time by services such as
Google Trends; and Web sites may be created to attract worldwide feedback on any
subject.
g) Historical Research: Historical research is that which utilizes historical sources like
documents remains, etc. to study event or ideas of the past including the philosophy of
the person and groups at any remote point of time.
h) Action Research: Action research is a reflective process of progressive problem solving led
by individuals working with others in teams or as part of a "community of practice" to improve
the way they address issues and solve problems. Action research can also be undertaken by larger
organizations or institutions, assisted or guided by professional researchers, with the aim of
improving their strategies, practices, and knowledge of the environments within which they
practice.
Kurt Lewin, then a professor at MIT, first coined the term “action research” in about 1944, and it
appears in his 1946 paper “Action Research and Minority Problems”. In that paper, he described
action research as “a comparative research on the conditions and effects of various forms of
social action and research leading to social action” that uses “a spiral of steps, each of which is
composed of a circle of planning, action, and fact-finding about the result of the action”.
Types of Reference and Information Service
Types of Reference and Information Service: The emergence of the internet extends the
reference librarian's ability to provide diverse and complex services and potentiality to show
their real professional expertise to meet the demand put on them.
a) James I Wyer Theories: In considering the scope of reference services, James I Wyer
proposed three theories of reference service i.e conservative, moderate and liberal. Samuel
Rothstein called them minimum, middling, and maximum.
i) Conservative: It includes giving occasional personal assistance to the inexperienced and
bewildered reader. It limits the help to pointing the way only and so it is traditional in nature.
ii) Moderate: The moderate reference service goes beyond providing mere instruction to actually
helping the reader in using the book or finding the document and facts, etc.
ii) Liberal: It includes the provision of the full and direct supply of reliable information to the
readers.
b) Edward B. Reeve’s Categories: Edward B. Reeve and others have categorized the activities
of reference staff into the following five categories on the basis of related functions.
i) Instructional Activities: These are characterized by explicit teaching function.
ii) Skill Maintenance Activities: These are related to up-dating the knowledge of reference tools.
iii) Patron Service Activities: This deals with providing information to the users of the reference
service.
iv) Maintenance Activities: These are house keeping activities.
v) Surrogate Activities: These are those activities which the reference staff perform on behalf of
the other departments / sections of the library.
c) Dr. S. R. Ranganathan’s Classification: Dr. S. R. Ranganathan identified two aspects of
reference work - Ready reference service and Long range reference service.
i) Ready Reference Service: Most of the ready reference services are of the nature of fact finding
types that can be finished in a very short time – in a moment if possible. The librarian generally
uses reference book for providing such kind of services. The need of ready reference services
arises from the fact of the complex nature of a reference book, its artificiality, and arrangement
of information. The eminent person, foreign dignitaries or scholars generally approach for such
type of services. Sometimes some regular customers also need the fact finding reference service
because of shortage of time on their part.
ii) Long Range Reference Service: The long range Reference Service is based on consulting
every possible source of information to arrive at the required information; as such, it is not
possible to render this type of service immediately. The time needed may range from half an hour
to weeks. The search in the long range reference service starts at the reference books and then
goes to the ordinary books, pamphlets, reports, articles in periodicals, etc. If the information is
not available in the library then the search can even go to other local libraries and occasionally to
the other libraries in the country. The long range reference service provided today can become
the ready reference service tomorrow, as by this time the reference librarian will be able to locate
the material quickly from his past experience. Slowly, the scope of long range reference service
started expanding. Now bibliographical service, referral service, translation service, etc are
considered long range reference services.
d) American Library Association’s Categorization: In 1942, the American Library Association
undertook a series of library job analysis. This association has stated the following six functions
of Reference Service
i) Supervision Function: This function consists of the proper organization of facilities, reference
section, selection of reference materials, direction of personnel, and study of the library clientele.
ii) Information Function: There should be an Information Desk where enquiries are received
and routed to proper section. The Reference Librarians should be prepared to answer all types of
questions and should be able to produce the sources that would answer the questions.
iii) Guidance Function: The Reference librarian should be able to recommend a good book for
respective fields. He should be able to give guidance to the readers regarding higher education,
career related information or profession or vocation. He can also give guidance to the readers in
the location of the document, in the choice of books and other reading materials.
iv) Instruction Function: The Reference librarian should instruct the readers about the working
of the library, the location of the material, the use of the catalogue card, the reference book, etc.
An initiation or orientation programme should be arranged to familiarize the readers with the
library practices and procedures.
v) Bibliographic Function: There should be a preparation of bibliographies of interest to the
readers so that they are able to know about the books and other reading materials required for
their respective subjects.
vi) Appraisal Function: The libraries should possess the right kind of materials and reference
collections and the staff should be able to get the most out of it.
1. General Categorization of Reference and Information Service: The focal point of
Reference Service is answering questions posed by the library user. Based on the activity that are
performed to meet the user demand, the Reference and Information service can be categorised as
follows:
a) Instructional: Instruction in using the library and library resources (bibliography,
encyclopaedia, OPAC), assisting the end user to locate the appropriate material within and
outside the library, etc. are an important function associated with the Reference and Information
Service of a library. Questions that range from as simple as "Where are the bound volume?" or
"Where is the catalog?" to research questions that may take hours or even days to properly
answer are to be dealt with in this section.
b) Referral Service: It directs enquirers to a source of information which may be an
organization or an individual expert. Generally, when a library or information centre does not
have the material and cannot obtain it from the sources but it knows the exact location of the
document / information, then it can refer the user to the sources of information.
c) Information Scouting: Information scouting service consists of keeping abreast of who has
what information and where. Then it can refer the request to the appropriate person and place in
the organization or outside it or both. Information scouting is an extended form of referral
service.
d) Citation Verification Service: Citation Verification Service is intended to verify the
citations/references and authentication of bibliographical details of books, articles, reports, theses
and other published materials obtained from sources other than the authoritative indexing and
abstracting services offered by reputed publishers and licensed database producers. The library
patrons need this type of service for the preparation of assignments, dissertations, theses, and
project proposals.
e) Literature Search / Bibliographical Survey: Literature search may be defined as a
systematic search for literature in any form on a particular topic. It forms the very first step of a
research pursuit. Otherwise, if a research work is duplicated the valuable time, money and labour
of the researcher will be wasted. The literature search is also needed to present the latest
available facts in writing articles or topic on any theme. Special library and information centres
generally provide literature search facilities to its patrons on demand. Later, the result of the
literature search is circulated to the enquirers. A sub type of this service is also known as
Database Search Service (DBSS), which intends to obtain information critical to the proposed or
ongoing dissertations, theses, post-doctoral research and other project work by consulting
different online and offline data bases.
f) Preparation of Bibliographies, Indexes and Abstracts on Certain Minute Subject: If
demands come from the research scholar or a research team member of the parent organization,
the library prepares the bibliographies, indexes and abstract for him/her to meet the demand. It
offers the bibliographies or reading lists on diverse topics relevant to the proposed or ongoing
dissertation work, doctoral and post-doctoral research. The compilation of bibliographies is the
end product of a literature search. From the bibliographies, the users can find out all the materials
on a given subject at a time. It helps the user in selecting the required information by saving
time.
g) Translation Service: Translation is a process of transforming precisely the information
contents of the text in one language into another language. The former is called the Source
language and the latter is called as the Text language. Translation service helps overcome the
language barrier.
In the field of science and technology, the National Translation Centre, Chicago,
America, International Translation Centre, Delft, Netherlands, British Library Lending Division,
Boston and in India, INSDOC, New Delhi have foreign language translation service for all the
individuals and organizations, who cannot afford the expensive in-house translation facilities. In
case of online, whenever a search result lists a relevant resource in another language, one can
check out AltaVista's translation feature. With this service, French, German, Italian, Spanish, and
Portuguese websites are translated to English (and vice versa). One can also try with Google
Translation to meet this purpose.
h) Interlibrary Loan Request: Interlibrary loan (ILL) is a cooperative activity and a
narrower form of interlibrary loan service. In theory, it is capable of expanding the walls of the
library to encompass all the world's library collections. The ILL concept is expanded by
UNESCO's Universal Availability Publications Program (often called UAP). UAP has the goal of
making any publication available to any person anywhere in the world. ILL has practical limits
that make its scope smaller but still its potential of expanding customers' access to other libraries'
collections is great. The material obtained from ILL may be delivered through different means
and avenue (physically, making photocopy or printing, scanning) based on the need of the user.
Processing interlibrary loan request from other library and delivering the material through
email / fax / speed post is another duty of the library reference staff.
i) Consultancy Service: Consultant can be defined as “an expert who gives professional advice
usually on payment basis” and consultancy can be defined as “an organization that provides
professional or organization expert advice on payment basis”. In the industrial sector the
consultants play a vital role by providing information & advice on production, export, import etc.
“Information Consultant” is a term used for those persons or firms involved in various activities
including library or information centre design, database design, records management, hardware
& software selection & training, etc. The library and information science professionals can
effectively discharge their duties as information consultants for various organizations as well as
individuals but to perform this duty they should have vast practical experience and in-depth
subject knowledge. In this connection the following points are to be noted:
i) Tools: Information consultants have their own unique set of tools, e.g. bibliographies, search
and meta search engines, databases, reference collection, etc. The consultants get their work done
with the help of these sets of tools, a particular combination & configuration of specialized
equipment technique & style in addition to their knowledge base as the organizer of world
information to get their job done.
ii) Benefits from Information Consultant: The importance of information consulting profession
is directly related with the advancement in micro-computer technology and information
explosion in print as well as digital environment. Consulting the information consultant can give
four benefits to the clients. These are-
* It provides objective independent advice in regard to political, religious and other matter;
* To take the help of consultants can be highly cost-effective because money can be saved by not
going through the vast number of documents and by procuring them and getting the required
information;
* The consultant has the necessary knowledge and skill;
* They are easy and convenient but the funding of the organization makes it difficult to employ
them for a long or short term basis in the organization.
iii) Services: Services rendered by consultants and consulting organization mostly fall within the
scope of technical enquiry service, feasibility studies, reviewing some technologies, software,
evaluating technologies, marketing of the products, market survey, designing new databases,
software to be used in information processing, storage or retrieval, system analysis &
management, advice on collection development, doing cataloguing, editorial services like
indexing, abstracting, etc.
j) Information Broker Service: An information broker (IB) is “an individual or organization
who on demand seeks to answer questions using all sources and who is in business for a profit”.
They are those individuals or firms who are so professional and experienced enough in their lines
that they can gather the requested information with a computer and a telephone within a few
minutes or hours. An IB may not simply be a librarian, or simply one who "goes online" and
searches for the answers to questions and problems of the patron; or he isn't someone who "has
all the answers".
The Association of Independent Information Professionals, the first professional
association devoted to information brokers, was formed in Milwaukee in 1987. The profession
has its roots in 1937 when librarians and other information professionals formed an organization
called the American Society for Information Science and Technology in an attempt to establish
their professional identity separate from public libraries.
i) Tools: IBs use a combination of online, offline, and physical search techniques depending
on the clients' needs. Every assignment is different and the IB determines the
appropriate method of obtaining the clients' requested information, while remaining
within the clients' budget. Once all the required information is located and retrieved,
the IB then cleans up the raw information and presents it in the manner most
appropriate for his/her client. This may mean summarizing the information or
verifying the correctness of it.
ii) Importance: If anyone had a major health problem they would not attempt themselves to
solve it. They would seek the services of the appropriate professional (a doctor in this case). So,
just a person would use an attorney for legal work or a doctor for medical work, they use an
Information Broker for access to the needed information. A great impetus for the growth of
information broker has come from the recognition that knowledge is a business and information
is a commodity and the fact that many people simply are not aware of many of the avenues
available to find the needed information. People can locate information in many cases, but it is
the experienced IB that knows and has access to more avenues of information retrieval than the
average individual or firm. After all, this is the IBs' specialty.
iii) Services: Information broker helps in getting the appropriate information by the end
users. It is a cost effective and time saving mechanism. The common uses for the information
brokers include market research, patent searches, and any other type of information research,
preparation of report on any subject, and so on.
2. Let Us Sum Up: Previously, personal assistance was provided on a part-time and
occasional basis. Increased demand for the services resulted in reference work becoming
a specialized function. It eventually gained the status of a separate department in
libraries. Personal contact with the client and explaining the policies and services of the
library can create a great interest of the reader for the library. Personal appearance of the
member of the library staff in front of the groups and individual is also helpful in this
regard.
Currently, reference departments in public, academic, and school libraries attempt to offer
at least moderate levels of reference and information service in all areas of its scope. It
helps the users find information for them, teach and instruct them how to use library
resources and how to do library research and by this way increase the popularity of the
library and its support by the library users. Departmental, professional school and
research institute libraries now tend to offer reference and information service of such a
quality and depth that it approaches that of a special library.
The Reference librarian is well aware of the vastness of the world of knowledge and the
varieties of intricacies of the information required by the reader at different level. So, he
can do much more for his reader. He can set the information seekers in the right track.
Activity
2) Climateculture (http://www.climateculture.com/)
3) Cyworld (http://us.cyworld.com/)
4) dol2day (http://www.dol2day.com/)
5) Facebook (http://www.facebook.com/)
6) Friendster (http://www.friendster.com/)
7) Hi5 (http://hi5.com/)
8) LinkedIn (http://www.linkedin.com/)
9) Multiply (http://multiply.com/)
Selection of Vendor
Selection of Vendor: Before placing the book for order the librarians should consider whether
the particular title can be acquired by gift, donation, by virtue of membership and so on. If not,
then only should it be considered for acquisition by way of purchase.
The vendor to be selected should be the one that is known to provide prompt and
satisfactory service. He should be honest in his dealings and must have a good reputation. In case
of titles published by learned societies, organizations, and institutions, it is often preferable to
place order directly to them for availing huge discounts.
The Good Offices Committee (GOC), New Delhi is a voluntary organization formed by
representatives of the book trade and libraries to standardize and introduce uniform terms of
book and periodical supplies to libraries. The committee meets at regular intervals and after
taking into consideration the fluctuations in currency rates it decides the rates conversion. It has
also laid down discount rates for different categories of books and periodical publications as well
as other terms for the book suppliers. As a result, there should be ordinarily no necessity for
calling for tenders and quotations, etc. for purchase of books and periodicals from Indian
vendors. A library should agree to abide by the terms laid down by the Good Offices Committee
and place order with the vendor who agrees to these terms.
The different practices followed by libraries in the choice of the supplier are:
i) Tender Method: In tender method, every book list of finally selected items is circulated among
a number of booksellers who are invited to quote their lowest prices for each item. The order is
placed for each item with the firm offering the lowest price.
ii) Quotation Method: In this method, quotations are invited for various categories of documents
along with trade discounts admissible in each case. This is done usually prior to the beginning of
the financial year. The supplier for each category is fixed finally on the basis of the most
economic terms offered.
iii) Standing Vendor Method: A standing vendor is one who is appointed as the authorized
supplier to library for a specified time, generally for a year or two, under prescribed terms and
conditions of supply.
iv) Books – on – Approval Method: In this case reputed publishers will be sending their new titles
as and when published to the library directly. These items are accepted after due process of
selection. The formal order will be placed with the local bookseller named by each publisher.
Sometimes the local booksellers, at frequent intervals, bring some recent publications for
approval and ordering. The selected items are included in a formal order and accepted while the
others are returned.
v) Open Purchase: Purchasing from the book fairs and buying from any bookseller from the
open market comes under this method.
vi) Direct Ordering with Publisher: Direct ordering with publishers or their representatives is
done by some libraries.
Search Engines
Search Engines: A search engine is a program or information retrieval system designed to help
one in retrieving a list of references or information, meeting a specific criterion from its own
databases that are stored on a computer. The computer may be a public server on the World Wide
Web, a computer inside a corporate or proprietary network, or a personal computer.
The earliest Internet search engine was Archie, which was created in 1990 by Alan
Emtage a student at Mc Gill University in Montreal for anonymous FTP sites. This is the
grandfather of all search engines. In 1993, the University of Navada System Computing Service
group developed Veronica, which was created as a type of searching device similar to Archie but
for gopher files. This is treated as the grandmother of search engines.
In June 1993, Matthew Gray, then at MIT, produced what was probably the first web
robot, the Perl-based World Wide Web Wanderer, and used it to generate an index called
“Wandex”. The purpose of the Wanderer was to measure the size of the World Wide Web, which
it did until late 1995. The web's second search engine Archie-Like Indexing on the Web (Aliweb)
appeared in November 1993 due to the effort of Martgn Koster. Aliweb did not use a web robot,
but instead depended on being notified by website administrators of the existence at each site of
an index file in a particular format. ALIWEB is no longer maintained.
In December 2003, Orase
(http://forums.searchenginewatch.com/showthread.php?t=1716) published the first version of its
new real time search technology. It comes with many new functions and the performance
increased a lot.
a) Component of a Search Engine: A general search engine typically functions by considering
three components.
i) Crawler / Spider / robots: Web crawling is the process of locating, fetching, and storing Web
pages. The Web crawler or spider or robot is a computer program. It starts from a seed pages to
locate new pages by parsing the downloaded pages and extracting the hyperlinks within.
Extracted hyperlinks are stored in a FIFO fetch queue for further retrieval. Crawling continues
until the fetch queue gets empty or a satisfactory number of pages are downloaded. Each time a
spider visits a web page it scans all the text and follows every link it sees.
Some search engines such as Google store all the scan pages but some like Altavista store
only the words of the scan pages in an ever increasing databases. Theses store pages are known
as cached pages. The contents of each page are then analyzed and it catalogues the URL and a
list of words in an index database for use in later queries.
ii) Indexer: The downloaded content is concurrently parsed by an indexer and transformed into
an inverted index. It represents the downloaded collection in a compact and efficiently queryable
form. The indexes are regularly updated to operate quickly and efficiently. The database of
search engine is most often created by spiders or robots automatically.
iii) Query Processor: The query processor is responsible for evaluating user queries and
returning to the users the pages relevant to their query. The search engine allows one to ask for
content meeting specific criteria (typically those containing a given word or phrase) into a search
“box”. When a user makes a query typically by giving keywords the engine looks up the index
and provides a listing of the best matching web page according to its criteria, usually with a short
summary containing the document’s title and sometimes a part of the text. The list is often sorted
with respect to some measure of relevance of the results. Because these databases are very large,
search engines often return thousands of results.
b) Ranking of Site at Search Engine: Best matches and what order the results should be shown
in, varies widely from one search engine to another. The method also changes over time as
internet usage changes and new techniques evolve but people at large accepted Google to be
more useful in this regard. But, researchers at NEC Research Institute claim to have improved
upon Google’s patented page rank technology by using web crawler to find Communities of
website. This technology instead of ranking pages uses an algorithm that follows link on a
webpage to find other pages that link back to the first one and so on from page to page. The
algorithms remember where it has been and index the number of cross links and relate these
into grouping. In this way virtual communities of web pages are found.
c) Types of Search Engine: Configurable Unified Search Index (CUSI) search engines, like All-
in One Search Page and W3 Search Engines are pages which list search engines.
The search engines can be categorized based on the coverage as-
i) Web Search Engine: It searches for information on the public Web.
ii) Enterprise Search Engines: They search on intranets.
iii) Personal Search Engines: It searches individual personal computers.
iv) Custom Search Engine: Search within the contents defined by the user(s).
v) Meta Search Engine: The content of search engines indexes and databases will vary. So if the
same query is typed into several search engines it is likely to produce different results, Because
of this in searching a topic a user often wants to see results from various sources. One way to
compare the results of several search engines is to type and retype a query into individual search
engines one at a time. However, this can be very time consuming. A Meta searcher helps to make
this task more efficient by providing a central location where the query is typed in once and the
result can be obtained from multiple search engines. Meta Crawler, Search.Com
(http://www.search.com), etc. are examples of Meta search engines.
Based on the contents that are considered for search, search engine can be-
i) Web Search Engine: Search all types of contents over the web. Eg. Google
(http://www.google.com).
ii) Discussion Group Search Engine: Search only discussion groups. For example Google
groups (http://groups.google.co.in), Yahoo groups (http://in.groups.yahoo.com/).
iii) Blog Search Engines: Search only Blogs. For example, Google blogs
(http://blogsearch.google.co.in), etc
iv) Image Search Engine: For example, Google images (http://images.google.co.in), etc.
v) Maps Search Engine: For example, Google maps (http://maps.google.co.in), etc.
vi) Video Search Engine: For example, blinkx (http://www.blinkx.com/), fooooo
(http://en.fooooo.com/), Truveo (http://in.truveo.com/), Google videos
(http://video.google.com/), etc.
vii) Hypermail Search Engine: It searches for mailing lists.
viii) Hypernews Search Engine: It searches for USENET newsgroups.
ix) News Search Engine: For example, Google news (http://news.google.co.in).
x) Books Search Engine: For example, Google books (http://books.google.co.in).
xi) Subject Directory Search Engine: They search Web directories which are maintained by
human editors. They include a keyword search option which usually eliminates the need to work
through numerous levels of topics and subtopics. For example, DMOZ.org, Yahoo!
(http://www.yahoo.com/), Looksmart (http://www.looksmart.com/), etc.
Some other types of search engines are-
i) Crawler based Search Engine: WebCrawler that was launched in April 1994 was the first
“robot” keyword search engine. Its robot program indexes the entire content of pages retrieved
but not URLs embedded in those pages. WebCrawler acquired by America Online in June 1995.
World Wide Web Word was also a robot based search engine; it indexes only HTML document
titles, text explaining page links and URL’s.
ii) Human-Powered Search Engines: The Human-Powered Search engines search the pages or
websites that are collected for index by the human. The examples of such type of search engine
include: Anoox <http://www.anoox.com/>, ChaCha <http://www.chacha.com/>, Collarity
<http://www.collarity.com/>, Earthfrisk <http://earthfrisk.org/>, iRazoo
<http://www.irazoo.com/>, Mahalo <http://www.mahalo.com/>, Sproose
<http://www.sproose.com/>, Wikia Search <http://alpha.search.wikia.com/>, etc.
iii) Mobile Search Engines: For example, Google mobile (http://www.google.com/mobile).
iv) Simultaneous Unified Search Engine (SUSI): The WebCompass acts as a personal SUSI
search engine, where the user defines a set of search engines in a local database, defines a
concept map of terms with associated search word, and then configure WebCompass to keyword
search. A personal edition of WebCompass and other shareware packaged with similar
capabilities are freely available. Other SUSI based services like SavvySearch or MetaCrawler
search a range of search engines at a time. The drawback of SUSI is that their response time is
slower.
v) Personalized Web Search: Google developed a personalized web search whereby the user can
set up a profile and retrieve the results based on their interests.
vi) Grid Search Engine: A grid search engine can be defined as “a type of a parallel and
distributed system that enables sharing, selection, and aggregation of geographically distributed
autonomous resources dynamically at runtime depending on their availability, capability,
performance, cost, and users’ quality-of-service requirements”. In a grid search engine, for each
user query an individual crawl is started over the fresh copies of the Web document i.e the
original one but not the cached one, and the relevant pages are selected. In this way, up-to date
versions of the pages are evaluated and accuracy of the resulting answer set of pages is enforced.
The grid search engines are sometimes known as Real Time Search Engine. For example, in
December 2003, Orase published the first version of its new real time search technology.
vii) Natural Language Queries (Index Crawling): For example, Altavista, Ask Jeevas.
viii) Freeware Search Software: Freeware Search Softwares are used via a WWW servers CGI,
like freeways, Glimpse and SWISH (Simple Web Indexing System for Humans).
In near future it is no doubt that some subject search engines will come out to overcome
the problem of general search engines.
d) Importance of Search Engine: Search engines are the most popular destination on the
internet. Again, the cached pages maintained by some search engines are very useful when the
content of the web page has been updated and the search terms are no longer in it, or the web
page is no longer available or the site’s server is down. So, in such cases when a particular
website is withdrawn one can search for cached pages for the data that may no longer be
available elsewhere.
Without search engine, to try to find what you need can be like finding a needle in a
haystack. To use search engines effectively, it is essential to apply techniques that narrow the
results and push the most relevant pages to the top of the results list.
e) Examples of Search Engine: Nowadays, we have thousands of search engines for searching
over internet. Each of the search engines makes an appearance over the web; continues for some
time, then the new one emerges and the old one falls to decay and disuse. Some of the popular
types of search engines, which create new milestone in the origin and development of search
engines, are discussed below
i) Lycos: Lycos (http://www.lycos.com/) was started at Carnegi Mellon University as a research
project in 1994 and it was one of the first engines. It ceases crawling the web for its own listing
in April 1999 and instead uses crawler based results provided by Fast i.e All the Web.com. Now
it is owned by Terra Lycos, a company formed with Lycos and Terra Networks merged in
October 2000.
ii) Altavista: Altavista (http://www.altavista.com/) was originated in 1995. It was the first search
engine to use natural language queries (index crawling), meaning a user could type in a sentence
like “Who is the Prime Minister of India” and does not get a million pages containing the word
“Who”. AltaVista also offers a number of powerful search features not found elsewhere. One
very effective tool available on the Advanced Search page is the NEAR search. A NEAR search
limits the results to pages where the keywords appear within 10 words of each other. This can be
extremely helpful in situations where an AND search produces too many results and a phrase
search (" ") produces too few results. Altavista also provides news and multimedia which was
owned by Digital Equipment Corporation.
iii) Ask Jeevas: Ask Jeevas (http://www.ask.com/) initially gained fame in 1998 and 1999 as
being the natural language search engine that lets one to search by asking questions and being
responded with what seemed to be the right answer to everything. i.e it can be said that it delivers
search results based on one’s question.
Activity
School Library
School Library: The school library is a part and parcel of a school set up. It exists to serve the
objectives of its parent institution. The school library awakens and fosters reading habits among
children and young students and enlightens their imaginative minds.
a) Definition: School libraries serve elementary schools, middle schools, high schools and
higher secondary schools.
b) Objectives: The primary school library aims to create a love for books, generate interest in
reading them and slowly develop the habit of reading. The secondary and higher secondary
school libraries maintain their identity fulfilling all the requirements of the young students for
learning and the teachers for teaching. The main function of a school library is to support various
educational programs and to develop students’ skills in locating and using information to
perform their class work. Teachers use school libraries to access information needed to develop
and support their classroom instruction.
c) Collections: School libraries usually maintain collections in a variety of media. In addition to
books, magazines, and newspapers they also contain photographs, films, sound and video
recordings, computers, CD-ROMs, games, maps etc. As such, they are sometimes also called
library media centers. Most school libraries further enhance their collections by becoming
members of school library networks; this allows them to share resources with libraries in other
schools.
i) Elementary School Libraries: The elementary school libraries should build up a good stock
of books and other learning and teaching materials. Collections should include picture books,
biographies of great men and women, books of travel and humor, folk tales, stories of animals
and birds, reference books for children, children’s magazines, audio-visual aids like motion
films, video-cassettes, models, charts, photographs and toys.
These libraries generally feature children’s illustrated storybooks, colouring books, and
audio visual materials. Some elementary school libraries feature computers with children’s
educational software.
ii) Middle School and Junior High School Libraries: It should develop an excellent stock of
text books, general books on popular science, biographies, travel books, books on sports and
games, fiction, short stories, conventional reference books such as dictionaries, encyclopedias,
year books, directories, etc., periodicals, audio-visual material and so on.
iii) High School Libraries: Libraries at the high school level (typically Class 8 to 12) have
larger and more advanced collections than the lower grade libraries.
d) Services: The service rendered by different types of libraries is as follows-
i) Elementary School Libraries: Elementary school libraries play a central role in early
childhood education by offering the young children some of their earliest encounters with books
and other resources. The librarian helps the students to cultivate the habit of using library, not
only with reference to their reading for course requirements but also for reading for pleasure,
general knowledge and recreation.
ii) Middle School and Junior High School Libraries: Libraries at the middle school or junior
high school level (typically Class six and seven) concentrate on maintaining students’ interest in
gaining information and developing ideas. To adequately support classroom assignments, middle
school and junior high school libraries usually offer larger and more varied collections than those
at the elementary level. They also often supplement these collections with computer databases
and more sophisticated bibliographic tools. Most school libraries also contain reference materials
such as encyclopedias as well as fiction and nonfiction books. They also give proper orientation
to search through the school library’s catalogue, find a book on the shelves, and check out the
book from the circulation desk. A growing number of schools at this stage encourage students to
come to the library throughout the day to complete the class assignments, to read for pleasure,
and to meet and work with their peers. This flexible scheduling allows schools to integrate
library resources into daily classroom instruction. It helps the parent organization in the
achievement of the educational programmes by providing materials to supplement and enrich the
subjects taught in the class-room. It suggests readings, supplies materials, and stimulates
interests.
iii) High School Libraries: These libraries are of larger type to accommodate at least 15-25
percent of the entire student body at any given time. The best-equipped high school libraries
feature reference collection, computer labs, the reading room, well equipped seminar or
conference hall etc. Most high school libraries also include separate areas devoted to college or
vocational preparation. These areas typically contain information on individual colleges,
examples of college applications, vocational aptitude tests, and other materials designed to
provide guidance for graduating high school students.
Sampling Technique
Sampling Technique: Survey is an important research method used to acquire knowledge
systematically from a context of human experience. But the entire context, i.e. the entire
population of interest cannot be acquired always as because one can neither afford money or time
nor resources for scientifically covering the entire universe. Hence a sample is chosen from the
entire population to project the result of the sample surveyed to its universe. The method through
which a sample is chosen from a population is known as “Sampling Technique”.
a) Definition: Sampling is a technique where the sampler selects some of the elements with the
intention of finding out a conclusion about the total population from which they are taken. It may
be defined as the selection of some part of an aggregate or totality on the basis of which a
judgment about the aggregate or totality is made. In other words, it is the process of obtaining
information about an entire population by examining only a part of it.
b) Need for Sampling: The need for sampling is felt due to the following reasons-
i) It is generally more economical in time, effort and money to use sampling;
ii) If sampling is conducted by trained and experienced investigators then sampling may enable
more accurate measurements for a sample study.
iii) Sampling remains the only way when population contains infinitely many numbers.
iv) Sampling remains the only choice when a test involves the destruction of the item under
study.
v) Sampling usually enables to estimate the sampling error and thus, assists in obtaining
information concerning some characteristic of the population.
c) Characteristic of Good Sampling: If the sample results are to have any worth while
meaning, it is necessary that a sample possesses the following essentials characteristics.
i) Representativeness;
ii) Adequate;
iii) Independence;
iv) Homogeneity.
d) Types of Sampling: Sampling can be categorized into the following-
i) Nonprobability Sampling: Non probability sampling methods are those which do not provide
every item in the universe with a known chance of being included in the sample. The selection
process is at least partially subjective. Nonprobability sampling again can be categorized into the
following types
* Convenient Sampling: A convenience sample is obtained by selecting “convenient” population
units i.e. the peoples who are convenient to response.
* Judgment Sampling or Purposive Sampling: In this method of sampling the choice of sample
items depends exclusively on the judgment of the investigator. In other words, the investigator
exercises his judgment in the choice and includes those items in the sample which he thinks are
most typical of the universe with regard to the characteristic under investigation.
* Quota Sampling: In a quota sampling, quotas are set up according to some specified
characteristic such as based on income, age, political or religious affiliations and so on. In the
next step within each quota the selection of sample items depends on personal judgment of the
researcher. It is the most commonly used sampling technique in non probability category.
* Snowball Sampling: It is a technique in which an initial group of respondent is selected
randomly, and then subsequent respondent are identified based on the referrals provided by the
initial respondents.
ii) Probability Sampling: Probability sampling methods are those in which every item in the
universe has a known chance or probability of being chosen for the sample. This implies that the
selection of sample item is independent of the person making the study that is the sampling
operation is controlled so objectively that the items will be chosen strictly at random. Probability
sampling can be grouped into the following
* Simple or Unrestricted Random Sampling: Simple random sampling refers to that sampling
technique in which each and every unit of the population has an equal opportunity of being
selected in the sample. In simple random sampling which item gets selected in the sample is just
a matter of chance – personal bias of the investigator does not influence the selection. To ensure
randomness of selection one may adopt either the lottery method or consult table of random
numbers. The advantages of simple random sampling includes-
- It requires only a minimum of knowledge of the population in advance;
- It is more representative of the population as compared to judgment sampling;
- It is free from personal bias and prejudice;
- The method is simple to use;
- The analyst can easily assess the accuracy of this estimate because sampling errors follow the
principle of chance.
* Systematic Sampling: If a population can be accurately listed or is finite, systematic sampling
technique can be used. The lists are firstly prepared in alphabetical, geographical, numerical or
some other order. The items are then serially numbered. The first item is selected at random
generally by following the lottery method. Subsequent items are selected by taking every nth item
from the list.
* Stratified Sampling: In stratified sampling the population of the universe is divided into smaller
homogeneous groups, or strata by some characteristic and form and from each of these similar
homogeneous groups draw at random a predetermined number of units. The usual stratification
factors are sex, age, socio, economic status, educational background, residence (urban or rural),
occupation, etc. In the standardization of test and public opinion polls, the method of
stratification is necessary.
* Cluster Sampling: In multi-stage or cluster sampling, the random selection is made of primary,
intermediate and final (or the ultimate) units from a given population or stratum. There are
several stages in which the sampling process is carried out. At first, the first stage units are
sampled by some suitable method, and then a sample of second stage unit is selected from each
of the selected first stage unit, again by some suitable method, which may or may not be the
same as that of the first method. Further stages may be added as required.
e) Limitations of the Sampling: Despite the various advantages of sampling, it is not
completely free from limitations. Some of the difficulties involved in sampling are stated as
follows:-
i) A sample survey must be carefully planned and executed otherwise the results obtained may be
inaccurate and misleading.
ii) If sampling is not conducted by qualified and experienced persons, the information obtained
from sample survey cannot be relied upon.
iii) If the information is required for each and every unit in the domain of study a complete
enumeration survey is necessary.
Role of Information
Role of Information: From the primitive days of human civilization to the present day
information has always been a component of growth and development and improvement of the
living standard. Nowadays, the information has come to occupy the central position to be
reckoned as the driving force for all human development. It is clearly interlinked with the growth
and development in economic, political, social, occupational, cultural and other sectors of the
society. Information and knowledge have become the principal generator of wealth in the form of
educational institutions, research and development establishment, scientific and technological
centres and other similar knowledge oriented bodies.
The impact of information and knowledge is seen in a number of human activities
centering on information. Some of these which will give a cursory account of societal changes
taking place in a few sectors are as follows:
a) Education: Education is the process of acquiring general and specialized knowledge by
means of study and learning that develop intellectual power of reasoning and judgment. At no
point of time in the life of a person does education really terminate and in real sense it is a
continuous process. While IT provides easy and effective access to the different types of
educational kits, information is the life blood of education. It is the essential ingredient in new
ideas, in course content and curriculum development, and in the creation of material and methods
of technology and learning. Students need information for pursuing academic studies; teachers
need information for teaching their students.
b) Research and Development: Research is a never ending spiral activity. It aims to provide
solution to problems. The inputs as well as the output of research are information. So
information is the life blood for research and development. The quality of information content
alone will determine the success or growth and development of research. Researchers need
information on a continuous basis for conducting research works.
c) Management and Decision Making: We are living in a world of change. We face
complexities, uncertainties and risks unknown to our predecessors. The list of activities in our
private life and its associated problems are virtually endless. In each of these personal activities
decisions are required to be taken and information is needed to support the decision. People need
information to make the best possible decision. People with information are likely to have better
career opportunities and to be better equipped to make personal decision.
Information provides a means of improving the management of enterprises and services
of all kinds. Information is needed by the decision makers in organizations. A common need
basic to all decision makers is an understanding of the purpose of the organization, that is, its
policies, programmes, plans and goals. The decisions to be made in an organization do vary and
the information needs also vary. A manager needs information to choose the possible alternatives
presented in terms of ranges of values of particular attributes. Information provides a wider
knowledge base for the solution of any problem; it gives new alternatives and approaches to the
solution of technical problems and opinions for minimizing future fault. It improves
effectiveness and efficiency of technical activities in the production and service sector. So
information is used for better decision making in all sectors and at all levels of responsibilities.
Governmental officials of different levels need information for decision making. They
need census, weather and other related information. Legislators need information of different
types to argue a point on the floor of the legislature.
d) Daily Life of a Person: Naturally, living today is quite different from what life was about a
generation ago. Nowadays people in different situations require information on a subject in
different forms and with different emphasis and different depth of explanation. An ordinary
person in his daily life needs to have access to information on many of his daily activities. It may
pertain to the quality, availability or cost of a number of things like articles of foods, health care,
education, entertainment, travel, social security, etc. One may need information on cooking,
gardening, house decoration and maintenance, and a host of other subjects. In private life one
needs information to organize vacation activities, to make intelligent purchases, fertilize a lawn,
soup up an engine, prune a shrub, groom a pet, select a garment, vote for a candidate, choose a
doctor or lawyer, protest a tax increase, evaluate career opportunities, pick an investment, select
a course, make a trip, plan meals and so on. The list of activities in a private life is virtually
endless.
e) Business and Industry: Information and knowledge are getting their appropriate place in
enterprises that are not static, because it is increasingly being recognized today that external
information on market, competitors, social and political environment, government regulations
and trade and tariffs etc. are invaluable if an enterprise is to thrive. It is only due to the central
role of information that business and industries are day by day inclined to invest in R & D to
generate new knowledge which would ultimately provide them an edge over their competitors.
In business sector, information helps in telemarketing, better financial management,
customer service, training, sales, product development, market intelligence, looking for
customers, etc.
In industry, the types of information needed are not limited to production, but cover all
aspects of industrial activity. The major types are: identification of product, determination of
technical and economic feasibility including the potential for use of indigenous resources; outlets
for disposal of waste either as saleable by-products or for further processing, market or
marketing, etc.
f) Scientific Development: The increase in population has resulted in mounting social pressure
for increased production, but as population increases, natural and near natural commodities start
depleting. So there is an urgent need for exploitation of new resources, creation of artificial
commodities. All these developments are impossible without the use of proper information and
immediate use of new scientific discoveries.
Air transportation, the concept of global village, satellite communication, nuclear energy,
exploitation of outer space, improvement in agriculture, health, environment, etc are some of the
results due to exclusive use of information in the field of science and technology.
g) Government: Information improves the capacity of a country to take advantage of the
existing knowledge and “know how” to achieve success in various fields. So, the governments of
almost all the countries of the world are the largest consumers of information and knowledge. In
their commitment and responsibility to create a welfare state, they need information and
knowledge on every conceivable subject. They collect, organize and disseminate statistical data
on all its activities which constitute the most important and vital information resources for their
planning and later implementation and execution.
All ministries of the government need up to date and timely information on the overall
management of the country’s resources and general administration. Management Information
System (MIS), Decision Support System (DDS) are widely used in planning and policy making.
h) Socio-Economic Development: The role of information in socio-economic development can
be viewed from the following angles
i) Entertainment: With the viewer’s complete control over programmes, interactive television
(watch a missed TV show).
ii) Health Care: With information sharing and even diagnosis and treatment by means of
interactive video link-up.
iii) News: With consumers able to point and click to select information for personally tailored
news items.
iv) Home Shopping: With a 24 hours a day, virtual global mall accessed by two way video and
digitized sales.
v) Security: Electronic fingerprint, retina scanning, voice recognition, DNA finger print,
signature dynamics.
Today, information has become a great source of power as a principal driving force for
the acquisition of wealth, political strength and more knowledge etc. Information-rich countries
of today are becoming even more powerful than the colonial powers of the nineteenth and early
twentieth centuries, on account of their expertise in creating new information and knowledge and
exploiting them for their advantage. Information is not only the source of power but also an
effective power in itself if released in appropriate time.
Retrospective Conversion
Retrospective Conversion: Retrospective conversion is the process of turning a library’s
existing paper catalog record into a machine readable form. Retrospective conversion usually
entails using catalog cards (with a minimum of data like call number, author, title, ISBN and / or
LCCN information) to find or create bibliographic record in a database of machine readable
record such as OCLC (World Cat) and brining those records into the existing local database.
Usually retrospective conversion is done to obtain the full MARC records on each item. A full
MARC record contains valuable information such as summary information that can be key-
worded and searched using the electronic catalogue. MARC records are a standard format that
allows exchange of data between various sites or systems. The local database then allows
electronic access to the catalogue and automated circulation using patron and item bar codes.
a) History: In 1968, with the financial support of the council on library resources, the Library of
Congress conducted a study by a task force for retrospective conversion of the library holding. It
was known as Retrospective Conversion (RECON). The report of the task force was published in
1969. In August 1969, the RECON pilot project was initiated. The pilot project of RECON
continued for two years and approximately 58,000 records were converted during the pilot
project and the work is still continuing. The retrospective catalogue conversion made by the
British Library is held in the BNB/LASER file. It was built up by the British National
Bibliography (BNB) and the London and South Eastern Library Region (LASER).
b) Problem in Retrospective Conversion: Retrospective conversion solves the problem of
entering the data on each item in the library into a computer system. But though it has many
advantages, it has also some limitations. Some of the disadvantages are mentioned bellow:
i) Lack of standardization among the national MARC format in assigning content designators to
elements of information in the machine readable record.
ii) Diverse functions of bibliographic agencies;
iii) Lack of an internationally accepted cataloguing code for machine readable cataloguing
record.
iv) Lack of agreement among different bibliographical communities in organizing data contents
in machine readable record.
v) Lack of agreement as to the function of content designators.
vi) Lack of money by a small library creates problem in retrospective conversion.
vii) Lack of expertise required to meet the standard for retrospective conversion.
viii) Retrospective conversion always demands standardization of bibliographic content and
machine format.
ix) Incomplete or incorrect bibliographic information makes it impossible to match the shelf list
cards with the correct MARC records. The result is the addition of an incorrect record to the
database or the need to return the title to you for additional information.
Today, the computers have entered each and every area of a library. The library automation is
the application of modern technologies including the application of computer hardware and
software, different storage medias, telecommunications, etc. which help the mechanization of
any activity in the library. To implement the computer in the library, the selection of proper
hardware and software forms an essential part. If proper software is selected, it will
automatically generate or create OPAC which will replace the traditional card catalogue of the
library. The feature-rich software will also have the provision of retrospective conversion. It will
help the library to enter minimum of details about the document in their collection in the
database of some other libraries and will help in getting the full bibliographic record of the
document that can be embedded in the local database.
There are different software packages available for different activities of a library.
Sometime they are bundled together with lots of cool features to form integrated library
management software.
The open source softwares are gaining importance day by day. They provide a free
licence with the additional facility of extensive customization to meet the local need. In case of
commercial proprietary library management software SOUL 2.0, and LibSys 7 are popular in
India. In case of free proprietary software, the E-Granthalaya of NIC is gaining importance and
in case of Open Source software, Koha is day by day heading to win the race.
In case of Institutional Repository Software Packages, the Green Stone Digital Library
software (GSDL), EPrints, and Dspace are deployed in different institutions in India. In the
category of Content Management System (CMC), Drupal, Joomla, and MediaWiki is used where
as from the category of Learning Management System (LMS), Moodle are favoring by large
number of institutes.
3. Evaluation of Reference Sources: The checklists for evaluation of reference sources are
more or less same for all types of work. They can be applied to all sources with slight
modification. In general, they include the following
i) Authority: The work should be authoritative. The authority should be judged on the basis of
the reputation of the author(s), editor(s), compiler(s), sponsoring bodies and the publishers.
ii) Scope and Coverage: The kind of information included would depend upon the scope of the
work. Some work may cover a particular country or the whole world or all subjects while others
may be restricted to some specific or minute topic only. The date or period covered is an
important criterion. Sometimes it may relate to a particular subject, organization also. The
content page, preface, and introduction may give an idea of the information contained in the
work.
iii) Treatment: It is to be ascertained whether the information is reliable and accurate or not,
whether the treatment is biased or unbiased.
iv) Arrangement: The information must be systematically arranged. It is essential to have a
detailed index which should provide for various kinds of approaches.
v) Uptodateness / Revision: Though some reference sources may contain some retrospective
information, every year it should be thoroughly revised and updated. The time lag is important
for current sources.
vi) Format: All reference works should be a handy volume easy to withstand wear and tear. Type
face should be clear and legible with suitable headings and subheading in bold types for the
guidance of the readers.
vii) Special Features: The other special features of the work include its total cost and whether
the cost can be justified on the basis of its content.
Reference and Information Service
Reference and Information Service: The library is a service institution. The library services
fall into two main categories - information in anticipation and information on demand.
Information in anticipation relates to the current awareness / selective dissemination of
information service. The information on demand relates to the past information sought by a user
and for which there is the provision of reference and information service known as retrospective
searching.
The provision of information in anticipation aims to keep the users well informed and up
to date in their field of specialization and also in the related subjects. The service in anticipation
can be divided into three broad categories - technical services, public services, and public
relation and extension services.
Technical services are vital for all other services provided by the library. Any library
would find it impossible to provide public service for their patron without the work performed in
“the backroom” by technical staff. The Card Catalogue or in a modern library OPAC is the result
of the library technical services. Other technical work includes classification, preparation of shelf
list, preparation of various other kinds of guides, etc.
Previously, people used to differentiate the reference service from that of information
service, but in reality there is no borderline between the two. The two services cannot be
differentiated based on the fact whether the librarian is referring the user to the sources of
information or is directly providing the information himself. Even, referring the user to the
sources of information itself may serve the function of information service for a particular user.
The emergence of web has further changed the whole scenario. Now the reference and
information service goes side by side and they cannot be differentiated as it was done earlier. If
one however likes to differentiate then the information service can be treated as an extended
form of reference service. Infact, the information service is a relatively new term for reference
service. Characteristically, information service denotes the ultimate existence of the reference
work to all kinds of answers to questions which are based on all sources and which requires the
service of the library staff. However, the library services can be differentiated based on the user
approach into two i.e service on demand and service in anticipation. In case of service on
demand, the staff waits for the users to approach and make a request. The user gets the answer to
their specific inquiries pin pointedly, exhaustively and expeditiously. In the reference and
information service in anticipation, the staff goes to the user and the user waits for the staff /
document / information. The information provided is of general type mostly referred to the
document rather than providing exact information.
Reference service in the early years of the twentieth century was limited in general to the
instruction and guidance. The implied policy was of minimal assistance and emphasis on the
librarian as instructor. Librarians, however, soon found themselves increasingly drawn into “fact
finding” and providing direct information service. The need for librarians to become more expert
in diverse fields led eventually to a growing trend towards subject specialization in reference.
The Reference and Information Services Section addresses all aspects of reference works,
in all types of libraries, in all regions of the world. Current interests encompass the new
electronic environment and the resulting changes in reference work, role of the reference
librarian, and the quality of reference services.
1. Definition: According to Ranganathan, reference service is personal service to each reader in
helping him to find the document answering his interest at the moment pin pointedly,
exhaustively and expeditiously. It is the process of establishing “contact between the right reader
and right book at the right time and in the right personal way”.
According to James I Wayer, reference work is “that part of library administration which
deals with the assistance given to readers in their use of the resources of the library”. This
definition is too narrow because in these days, the reference librarian assists the readers to use
resources outside his/her own library.
Samuel Rothstein defines reference service as “the personal assistance given by the
libraries to individual readers in pursuit of information”.
According to Hutchins, “reference work includes the direct, personal aid within a library
to persons in search of information for whatever purpose and also various library activities
especially aimed at making information as easily available as possible”.
ALA Glossary states, “reference service is that phase of library work which is directly
concerned with assistance to readers in securing information and in using the resources of the
library in study and research”.
2. Need and Purpose: The demand for reference and information services in libraries grew
exponentially with the end of World War II and the tremendous growth in higher education that
followed. In general, the need and purpose of reference service arises from the following facts
a) Complex Nature of Library Tools and Techniques: In order to facilitate the use of the
library, the librarian provides various tools like classification numbers, library catalogue (OPAC),
shelf list, written guides of various kinds, bibliographies, indexing and abstracting of journals /
books, etc. But all these tools are based on complex rules and practices and the users are not
supposed to be aware of the ways by which they can be operated. So, there need to be a reference
librarian in the library who can serve as a sort of canvassing agent for these tools.
b) Increase Volume of Information: A variety of information sources emerged in large
numbers. It is so large that it is impossible for the reader to keep track of its variety and its
location. So, there is a need of reference service for the selection of the right kind of document at
less possible time.
c) Peculiarities of Sources of Information: Each kind of information source follows its own
practices in the arrangements of entries, provision of subject headings, preparation of indexes,
etc. So, it is not always easy to get the desired information out of some sources of information
(indexing and abstracting journals, bibliographies, encyclopedia, etc) without the help of the
reference librarian.
d) Lack of Time: Information has a value only if they are received in time and put into practice.
But many research teams and others do not have the time required to search for information in
their parallel development. It is also not desirable to expect from a highly paid research scientist
to spend time in search for the literature in libraries. It is also unprofitable for the parent
organization. So, the trend is to seek the help of a reference librarian to get the information in
time, for the preparation of bibliographies, indexes, abstracts, and for arranging for translation
etc.
e) Personal Psychology: The users may be of shy nature, gentle, aggressive, and meek; they
may be less educated or highly educated and so on. They need to be taken care of by a person
when they come to a library for the first time. Otherwise, they may feel utterly lost or confused
with the result that they may not come again. Even those who come regularly to the library
would need occasional personal assistance. All these call for an arrangement for reference and
information service on demand.
f) Promote and Support Library Service: A good reference and information service is bound
to encourage the use of the library. The satisfied users serve as a friend of the library and can
lead to greater library support. After all, the reference service is treated as the hub of all the
activities of the library. It may be considered as the ultimate manifestation of the laws of library
science.
g) National Economy: Sometimes the questions on a subject or topic are repetitive in nature in
the event of some local function. If each answer seekers goes to find the answer on their own, a
lot of man – hours will be wasted. So, in this regard reference service helps the national economy
by saving the time for the users.
3. Strategies in Establishing a Reference and Information Service: For establishing the
reference and information service, or to provide the reference and information service, the
librarian needs to go through the following steps:
a) Determining Aims and Objectives of the Library: The kind of reference service being
provided would vary from library to library. The service being rendered would depend upon the
type of library, its aims and objectives, its collection, the objectives of the reference section and
the philosophy of the chief librarian. The librarian should not waste much time in providing
answers to the questions that do not come within the scope of the parent organization, and his
library.
b) Staffing: Library and information science professionals should be appointed to look after the
on-demand reference and information service.
c) Facilities Organization: In addition to an extensive research/reading room, there is also the
need of a multimedia room equipped with high-speed computers with Internet and multimedia
capabilities, phone / fax machine in the reference section so that the Reference Librarian can
instantly provide the answers sought.
d) Building Reference Collection: The maintenance of the print reference collections including
dictionaries, directories, and encyclopedia is a must for any kind of reference service. Compiling
bibliographies, establishing and maintaining vertical files, preparing displays, bulletin boards,
and exhibits also often fall within the scope of the reference staff. Some fugitive materials
consisting of newspaper-cuttings, magazine clippings, folders and collection of some similar
kinds of materials should also be included in the reference section.
e) Gathering Knowledge of the Subject: The librarian should have a sound knowledge about
all the reference collections in his library. He should also know about the search engine, subject
directories and so on.
f) Marketing/Visibility: The library reference services should be marketed extensively to get
the attention of the library users.
g) Origin of the Query: Queries to the Reference Librarian can be made by the library user
himself physically, by post, through phone calls, email, online chat, and so on. The Reference
Librarian should be in a position to answer the queries in a mode suitable for the user. He should
be able to provide answer to the fact-finding question on phone / chat instantly.
h) Reference Interview: A user will feel the need for information. He may approach the
Information / Reference desk and make a request for information in the form of a specific query.
In the first attempt the Reference Librarian should determine the readers’ problem. He should be
able to state clearly what the reader wants.
i) Initiating the Search: The Reference Librarian should pick up the keywords to search in
bibliographies, indexes, online databases, subject search engines and so on. By using the prior
knowledge he/she should be able to decide the order in which each of the various sources
available should be consulted and then should follow the possible short-cut method.
j) Solving the Query: The reference librarian finds out and provides the answer to a specific
question raised by the library user. The information sought by the enquirer, its quality and level
will depend on the query and type of the question. It may take the form of delivering the specific
information itself or direct him to appropriate sources of information. The librarian may also get
the concerned information translated and provide the translated version of the document. He may
provide a self prepared subject bibliography, delivering the result of the literature search and so
on. In all cases the reference librarian’s answer should be user-centric.
k) Ethics and the Provision of High Quality Service: The library users have different
psychological temperaments, some are meek and inert, some have a superiority complex while
some are not articulate enough to express their wants or needs correctly or in a precise manner,
and some others may be of limited patience. The reference librarian should follow some basic
ethics to deal with every one. He should not share his personal experience about the users with
others.
l) Assimilation: In the reference service experience is the most important thing. The librarian
should periodically be able to absorb information and learn from his experience so that in near
future if same type of problem arises his movement should directly lead him to the path most
likely to provide the information he wants.
m) Sharing Experience with Others: A reference librarian should try to share his experience
with his colleagues in the reference section. During his work, he would discover certain
weakness in the collection, in the library catalogue, in the arrangement of documents, etc. He
should make suggestions to his colleagues in various sections of the library to bring about the
necessary improvement in the functioning of the library.
The reference librarian would also be dealing with the indexing and abstracting services
prepared by outside organization, bibliographies, national and international document service. He
should also share and point out the shortcoming of such tools to respective authorities.
n) Continuing Education of Reference Librarians: The reference librarian should be regularly
sent for training. For him training is essential to find the information he needs. Besides, the
emergence of the digital information sources and the rapid changes in technologies make it
necessary for the librarians to go for training periodically.
Recruitment, Selection and Test
Recruitment, Selection and Test: Recruitment of personnel refers to supply of new personnel to
work in an organization to fit into position with a well defined job description. The main aim of
recruitment should be to select best candidate for performing specific job in a library.
A library should aim to develop a positive and definite recruitment programme so that it
is able to reach out and attract the best available talent. There should be a continuous evaluation
of the recruitment programme.
Librarian should take care of all the aspects in recruitment of the staff in the library. He
should not have bias for anyone. He should keep in mind that only a suitable professional staff
can provide the adequate service to him as well as users.
a) Recruitment and Selection Procedure: The below mentioned procedures need to be
followed for recruitment or selection of candidate-
i) Ascertaining the Vacant Job: The vacancy may be due to retirement, resignation, termination
or dismissal. New post also may be created for specific job requirement.
ii) Deciding of Revising: If necessary, the requisite qualification, scale and other allowances, etc.
of the post should be revised.
iii) Advertisement: Inviting application by advertisement for the posts in national, state or local
newspapers or by publishing the information over website or broadcasting it through radio,
television, etc. should be carried out.
The advertisement should clearly give all related basic data about the post like the scale
of pay, position, job description, essential and desirable qualification, etc. The application form
to be filled up by the applicant should carefully be designed to get all the particulars of the
candidate to make tentative inference regarding his suitability for the particular post.
iv) Receiving the Application: Receiving the application of the candidates and processing these
methodically for deciding the names of candidate to be invited for interview. Library school
should also be consulted for this purpose.
v) Selection board: It involves task associated with deciding the interview dates, preparation of
the selection board, preparation of interview chart and verifying the data and sending these to
expert. For the selection of staff member, the chief librarian should be given a free hand and he
or she should also be free from bias. The chief librarian and the departmental head under whom
the person shall work must be the member of the interview board. It also involves the activity
associated with laying down interview criteria and test for the assessment of the candidates.
vi) Sending Interview letter: Sending interview letters to the candidate selected / recommended
by the expert or the library school or selection board.
vii) Interviewing the candidates: The purpose of interviewing is to find out the suitability of a
candidate and to seek more information to judge their personality and other traits. It is possible to
examine the academic background, knowledge of the subject, general awareness as well as
professional skills, areas of expertise, knowledge of technological development, and latest trend
of the profession within the country or abroad and other qualities. The interview board can also
assess the personal relation, study, motivation, attitude, mode of thinking, ability to adjust with
change, sense of co-operation, acceptance of challenge and efficiency of the candidates.
ix) Inviting opinion of referees: The references of suitable candidate are checked for their
personal details, especially their past history, political learning and professional standing. For
selection of the librarian, the authority may write to department of library science, prominent
librarians, etc. and consider their views.
x) Medical examination: Here, the candidate is asked to undergo medical / physical tests.
Medical examination serves to ascertain the applicant’s physical capability to meet the job
requirement.
xi) Selecting the candidate provisionally: After a candidate has cleared all the hurdles in the
selection procedure the candidate should be offered appointment subject to certain laid down
condition. For example probationary period, which gives an opportunity to the administrator to
correct mistake if any. If during the probation period candidate is not found suitable the
management may transfer him to some other job or give up the service.
xii) Issuing of a formal appointment order: In this step, a formal appointment order is issued by
the authority. The authority may also execute an agreement bond with the appointed candidate,
stating clearly all the relevant conditions of service, etc.
b) Testing the Candidate: Individuals differ with respect to physical characteristic, capacity,
level of mental ability, their likes and dislikes and also with respect to personality traits. When
matching of individual physical, metal and temperamental pattern with the requirement of the job
or field of training takes place the result is happiness for the individual and greater prosperity for
the organization and the society. This will require the use of selection test. These tests may take
the form of the following-
i) Personality test: These test aims at measuring the total personality of an individual.
Personality includes various traits and behaviour patterns such as initiative, judgment, self
confidence temperament, complex (superior / inferior), likes and dislikes, etc. Personality may be
measured by making use of any of the following three methods-
* Rating method: In the rating method the reliance is laid upon other person’s opinion about a
candidate.
* Question answer method: Here the personality of a candidate is judged from the answer given
by him to a series of questions asked from him.
* Experimental method: Here actual situation are created to know his reaction. For instance at
the circulation counter, a conscience box may be kept for collecting overdue charges from those
borrowers who return the books later. The honesty of the candidate can be judged from this
experiment.
ii) Intelligence test: The ratio of mental age to the real age can be judge by this method. A person
may be asked to name twenty five words in a minute. From such test, mental alertness,
understanding power, reasoning ability, etc. of a person may be found out. These tests are very
much prevalent now.
iii) Aptitude test: Every person has a peculiar aptitude. The aptitude test helps an employer to
know whether a candidate has got aptitude for a manual, mental, mechanical job or routine job.
One may be good at mathematical calculation while another may lack it. These tests give an
indication to the employer about the possible performance of a prospective employee. A person
for example may be asked to copy a straight line drawing.
iv) Trade test: Through trade test, a candidate’s knowledge to perform a specific work or job is
measured. He is asked to perform a similar job when he would be expected to perform when
appointed. A catalogue typist may be asked to type catalogue card. A professional may be asked
to classify actual books of a library in order to know his skill of classifying books. As such these
tests may also be named as “proficiency”, “performance” and achievement tests.
v) Interest test: Interest tests are useful in finding out the probable liking of a candidate for a
particular job. Through these test a person’s preference for a specific job may be known. A
candidate may be a good administrator but he may like a teaching job or vice versa. The interest
of a person may be found out through a well prepared questionnaire.
Any one or the combination of two or more test may be used in selecting library staff
because library work involves various types of jobs i.e. intellectual, manual, mechanical, routine,
administrative, guidance and teaching function.
c) Role of Librarian in the selection of the library staff: Sometimes librarians have been given
free hand to select the library staff but the condition is that he or she should be free from bias. In
all other cases librarian is the member of the library staff selection board. The chief librarian and
the departmental head under whom the person or candidate shall work is always the member of
the interview board. The main roles of librarian in the staff selection are –
i) Helps in the selection of harmonious administrative, technical and service staff.
ii) Recommend the Vice-chancellor or principal for employment of the staff.
iii) Can make recommendation to the Vice-chancellor or principal on all matter pertaining to the
status, promotion, change in position or dismissal of the library staff members.
Besides the above functions, librarians form an un-separable part of all the steps or
procedures of recruitment, test and selection of candidate as the staff member of the library.
Really Simple Syndication (RSS)
Really Simple Syndication: Really Simple Syndication, Really Simple Subscribing, Rich Site
Summary, RSS, feed, web feed (guardian.co.uk ) or channel or by whatever name we call it, it is
a family of Web feed formats that publish the contents from the frequently updated websites,
blog, podcasts, etc. It is the XML-based format that allows the syndication of Web content and
used to refer to the standards like Rich Site Summary (RSS 0.91), RDF Site Summary (RSS 0.9
and 1.0), Really Simple Syndication (RSS 2.0) and Really Simple Subscribing. RSS formats are
specified using XML, a generic specification for the creation of data formats. Although RSS
formats have evolved since March 1999 (My Netscape Network), the RSS icon first gained
widespread use in 2005/2006.
1. History: In 1995, Ramanathan V. Guha and others in Apple Computer's Advanced Technology
Group developed the Meta Content Framework (MCF) which forms the basic idea of
restructuring information about web sites. RDF Site Summary, the first version of RSS, was
created by Guha at Netscape in March 1999 for use on the My.Netscape.Com portal. This
version became known as RSS 0.9. (My Netscape Network). In July 1999, Dan Libby of
Netscape produced a new version, RSS 0.91 that simplified the format by removing RDF
elements and incorporating elements from Dave Winer's scriptingNews syndication format.
Libby also renamed RSS to Rich Site Summary and outlined further development of the format
in a “futures document”.
Winer published a modified version of the RSS 0.91 specification on the UserLand web
site, covering how it was being used in his company’s products, and claimed copyright to the
document. The RSS-DEV Working Group, a project whose members included Guha and
representatives of O’Reilly Media and Moreover, produced RSS 1.0 in December 2000. This
new version, which reclaimed the name RDF Site Summary from RSS 0.9, reintroduced support
for RDF and added XML namespaces support, adopting elements from standard metadata
vocabularies such as Dublin Core. In December 2000, Winer released RSS 0.92 a minor set of
changes aside from the introduction of the enclosure element, which permitted audio files to be
carried in RSS feeds and helped spark podcasting. In September 2002, Winer released a major
new version of the format, RSS 2.0, which redubbed its initials Really Simple Syndication. RSS
2.0 removed the type attribute added in the RSS 0.94 draft and added support for namespaces.
As neither Winer nor the RSS-DEV Working Group had Netscape’s involvement, they could not
make an official claim on the RSS name or format. This has fueled ongoing controversy in the
syndication development community as to which entity was the proper publisher of RSS. One
product of that contentious debate was the creation of an alternative syndication format, Atom,
that began in June 2003. The Atom syndication format, whose creation was in part motivated by
a desire to get a clean start free of the issues surrounding RSS, has been adopted as IETF
Proposed Standard RFC 4287.
In July 2003, Winer and UserLand Software assigned the copyright of the RSS 2.0
specification to Harvard’s Berkman Center for the Internet & Society, where he had just begun a
term as a visiting fellow. In December 2005, the Microsoft Internet Explorer team and Outlook
team announced on their blogs that they were adopting the feed icon first used in the Mozilla
Firefox browser. A few months later, Opera Software followed suit. This effectively made the
orange square with white radio waves the industry standard for RSS and Atom feeds, replacing
the large variety of icons and text that had been used previously to identify syndication data. In
January 2006, Rogers Cadenhead re-launched the RSS Advisory Board without Dave Winer’s
participation, with a stated desire to continue the development of the RSS format and resolve
ambiguities. In June 2007, the board revised their version of the specification to confirm that
namespaces may extend core elements with namespace attributes, as Microsoft has done in
Internet Explorer 7. In their view, a difference of interpretation left publishers unsure of whether
this was permitted or forbidden.
2. Need of RSS: In the days of the development of internet, users were maintaining bookmark or
favorite (Bookmark in Mozilla Firefox or Favorite in Internet Explorer) folder for the site that
they considered important to revisit after some interval of time to check its updating information.
In this case, users were left with no choice but to check the websites frequently or sometime
daily by actually visiting them in the browser irrespective of whether it is actually updated or
not. But due to the time constraint it is not possible to revisit each site of the bookmark or
favorite folder regularly, as each user have many favorite sites.
The development of newsletters or e-zine in the next step solves a general quest of the
problem. It helps the user to subscribe to the e-zine or newsletters of a particular site that in turn
contains a summary of all the latest updates made on the website. But it demands the disclosure
of email address to the website owners for subscribing, which can be easily used by spammers to
flood one’s mailbox with lots of junk mails. Subscribing to many newsletters at a time will also
itself flood one’s mail box and demand a considerable time to find out one’s valuable email out
of the whole. The task of reading every email, deleting it or shifting it to another folder will be
also a time consuming process in itself.
In the RSS environment, whenever a website is updated by means of producing an article
/ news item, it simultaneously produces a document that contains in it the summary of all the
updates made on the website. This document is in the form of an XML document. This XML
document that contains the summary of all updates is known as a “Feed” or “Atom” and it
usually has an “.xml” extension.
Blog that are hosted over Wordpress, Blogger, etc have an inbuilt feature of creating an
RSS feed automatically. So, every time when a blog is updated they create a RSS feed. So, the
blogger that hosted their blog does not require to create an RSS feed separately for their blog.
3. Versions: There are several different versions of RSS, falling into two major branches, 1.* and
2.*.
a) RSS 1.*: The RDF, or RSS 1.* branch includes the following versions:
i) RSS 0.90: It was the original Netscape RSS version. This RSS was called RDF Site Summary,
but was based on an early working draft of the RDF standard, and was not compatible with the
final RDF Recommendation.
ii) RSS 1.0: It is an open format by the RSS-DEV Working Group, again standing for RDF Site
Summary. RSS 1.0 is an RDF format like RSS 0.90, but not fully compatible with it, since 1.0 is
based on the final RDF 1.0 Recommendation.
iii) RSS 1.1: It is also an open format and is intended to update and replace RSS 1.0. The
specification is an independent draft not supported or endorsed in any way by the RSS-Dev
Working Group or any other organization.
b) The RSS 2.*: This branch (initially UserLand, now Harvard) includes the following versions:
i) RSS 0.91: It is the simplified RSS version released by Netscape, and also the version number
of the simplified version championed by Dave Winer from Userland Software. The Netscape
version was now called Rich Site Summary; this was no longer an RDF format, but was
relatively easy to use. It remains the most common RSS variant.
ii) RSS 0.92 through 0.94: They are expansions of the RSS 0.91 format, which are mostly
compatible with each other and with Winer’s version of RSS 0.91, but are not compatible with
RSS 0.90. In all Userland RSS 0.9x specifications, RSS was no longer an acronym.
iii) RSS 2.0.1: It has the internal version number 2.0. RSS 2.0.1 was proclaimed to be “frozen”,
but still updated shortly after release without changing the version number. RSS now stood for
Really Simple Syndication. The major change in this version is an explicit extension mechanism
using XML Namespaces.
For the most part, later versions in each branch are backward-compatible with earlier
versions (aside from non-conformant RDF syntax in 0.90), and both versions include properly
documented extension mechanisms using XML Namespaces, either directly (in the 2.* branch)
or through RDF (in the 1.* branch). Most syndication software supports both branches.
4. RSS Readers: The XML document can not be accessed by eyes, or if it is, it is very difficult.
So, there is a need of software that makes it readable to our eyes. The software that makes the
XML document readable to human eye is known as RSS Readers, feed reader or aggregator. So,
an RSS Reader is specialized software which interprets the RSS feed (written in XML language)
and present it in a readable form to end user. Using an RSS Reader to view the XML document
just looks like checking the mail box.
a) Types of RSS Reader: There are mainly two types of RSS reader- Online RSS reader and
Offline RSS reader. Google Reader, Yahoo, Bloglines provides online RSS reader. Google
Reader is free, fast and reliable. It needs not to be download just to do is to create a free account
at Google Reader. Alnera Feed Buster is a commercial offline RSS Reader which cost about
$19.95.
b) Subscribing to an RSS feed: If one wants to subscribe to the RSS feed of a blog, then he/she
needs to look for the “Atom” or “RSS” feed icon. After clicking on the RSS feed icon it will
show the feed address (usually right-click on an RSS icon and open it in a new browser window
will show the address). The user then need to copy and paste the address of the RSS feed of the
website in the RSS Reader. Now whenever, the user checks its RSS feed in the RSS reader, it
will show the updates that where made in the website of one’s choice.
Initially, reading various websites through their RSS feed in an RSS reader may appear a
little odd to anyone. However, as one will accustom with this activity he/she will find it as the
fastest and the easiest method to keep abreast with the latest updates of his/her favorite websites /
blogs.
5. Advantages: RSS is creating an earthquake in the online communication environment. It
helps one to filter among the world of blog, to push the latest updating of his/her favorite blog to
the RSS Reader at his own desktop that meet his/her personal, professional, or business needs.
Even an RSS aggregator has many blogs aggregated. Some other benefits are
i) Time Saving: One doesn’t have to save the file in his/her browser’s favorite folder and visit it
regularly to check for its new updates. Checking the RSS reader will save a considerable time
from the busy schedule of heavy net surfer by directly brining the content to his own desktop.
ii) Summary or Full Contents: RSS contains either a summary of content from an associated
web site or the full text.
iii) Current Awareness Service (CAS): It will keep abreast with the latest posting to a favorite
website without visiting it.
iv) Filtered Display: RSS makes it possible for people to keep up with web sites in an automated
manner that can be piped into special programs or filtered displays.
v) Privacy: In the RSS environment, one doesn’t have to disclose his/her email address to
others.
Currently a majority of websites / blogs are coming up with their RSS feeds. If a website
is not publishing its RSS feed, it is considered as its drawback.
Raja Rammohan Roy Library Foundation (RRRLF)
Raja Rammohan Roy Library Foundation (RRRLF): The year 1972 was the year of
celebration of the bicentenary of Raja Rammohan Roy, a great social reformer. The government
of India decided that a library foundation would be the best tribute to the memory of Raja
Rammohan Roy, who spent his life in fighting against forces that shackle and retard the progress
of a society. Thus, Raja Rammohan Roy Library Foundation was set up by the government of
India in 1972 as an autonomous body under the then Department of Culture, Ministry of
Education and Social welfare with its head quarters in Calcutta.
a) Objectives: The major objectives of the foundation are as follows:-
i) To promote library movement in the country.
ii) To enunciate a national library policy and work towards its adoption by the central and state
government.
iii) To help in building a national library system by integrating the services of national libraries,
state central libraries, district libraries and other types of libraries through interlibrary lending
system.
iv) To propagate the adoption of library legislation in the country.
v) To provide financial and technical assistance to libraries, etc.
b) Organization: The foundation consists of 22 members. Minister of education, government of
India or his / her nominee is the chairman. Indian Library Association is represented on the
foundation. In addition four eminent librarians are also its member.
c) Functions: RRRLF provides assistance to state government on matching basis for purchase of
books, organization of seminars and conferences, running of mobile library service, purchase of
furniture, etc.
d) Publication: It brings out Raja Rammohan Roy Library Foundation Newsletter (Quarterly) to
disseminate information about its activities.
Public Service
Public Service: The library public service manages the activities that directly assist the end-user.
The public service can be grouped into two major headings essential public service and enhanced
public service.
Generally, reading room, circulation, list of accession, printed catalogue, etc are treated
as essential (general) public services and Current Awareness Service (CAS), Selective
Dissemination of Information (SDI) are treated as enhanced (selective) public services. The
public service of the library generally depends upon one major factor i.e. whether it provides
open access to its collection or it is closed access.
The library public service sometimes is also known as information service. L. M. Harrod
defines information service as “service provided by or for any information centre which draws
attention to information possessed in its departments in anticipation of demand, this is done by
presenting and circulating news sheet, literature surveys, reading lists, abstract, particulars of
articles in current periodicals etc which, it is anticipated, will be of interest to potential users of
the service”. The information service is provided directly to the potential user of the service.
1. General / Universal / Essential Public Service: The general public services include the
following facilities and services
a) Building Collection of Reference Material: It will include acquisition of dictionaries,
encyclopedias, and bibliographies, indexing and abstracting periodicals and so on. The library
can also bring out different types of bibliographies, indexing and abstracting of different types on
its own to draw the attention of the user.
b) Card Catalogue: The card catalogues are filled in a cabinet containing many drawers
identified books and other materials. In a large library, the card catalogue often fills a large room.
c) Accession List / List of Recent Acquisition: Here, a list of books newly added to the library
is regularly compiled and distributed. These lists provide new books and journals added to the
library and are generally indicative, bearing very few details like author, title, publisher, pages,
call number and accession number. Sometimes, the library can also display the book jacket of
new additions prominently in the library to bring it to the notice of potential users.
d) Book Display: Displaying of library material pertinent to a special interest or illustrating a
historic occasion like man’s flight to space, and so on can be helpful. This enables the users to
keep themselves currently aware of the recent developments.
e) Newspaper Clipping Service: In this type of service the important topics / news published in
newspaper are cut and filed subject wise for being provided to the user.
f) Public Relation: Public relation is a day to day building of the atmosphere of good will with
the public in which a library can operate most widely and most effectively to give the best
possible service to its community. It is the relationship of the library with its user or borrowers,
with non borrowers of the community, with the trustees or library committee, with dealers,
collectors, salesmen of equipment, with scholars, with the staff and administrator for which
librarians work.
2. Enhance / Selective Public Service: The enhance public services can be grouped into the
following types.
2.1 Current Awareness Service (CAS): The awareness service provides knowledge to the user
regarding recent developments in the field of general interest. This type of service is directed
towards all users of the services. It does not deal with the exact or specific requirement or
interest of the user and is thus distinguished from SDI service.
The CAS helps the user by keeping him up-to-date & well informed with the latest
information on a particular field and also in the related field. It indicates what one should read
and thereby it saves the time of the reader. It also serves as a rapid survey of retrospective
literature. CAS helps the user in the following ways:
i) Keeps Well Informed: Due to great advances made in the field of knowledge, it is becoming
more and more difficult for the users to keep themselves up-to-date and well informed in their
field of specialization. CAS meets this end for the researcher and others. Otherwise, too much of
information would make it difficult for them to use information effectively.
ii) Helps the User in Scanning the Literature: There may be users who do not possess the ability
or willingness to do the scanning regularly on their own. CAS provides aid in such situation by
widely and regularly scanning the literature and sending to the user the relevant topic of interest.
iii) Saves Time: The Library and Information Centres by scanning the sources of information and
notifying the members of the community, saves their valuable time. Again, in case each user
scans literature individually then this will lead to unnecessary duplication of effort. So, the CAS
can help the user avoid this duplication.
iv) Promotes and Supports Library Service: All services of the library are not free nowadays. So,
in this context, it is essential to promote and market library services. CAS is one of the ways to
bring the resources of the library / information centre to the notice of the users. This will in turn
lead to greater demand for the library service, giving opportunity to the library to prove its value
and justification for the money spent on it.
Librarians have been providing the CAS service on manual basis for a long time. But
nowadays computers are used to mechanize the procedure. The current awareness service
through computer may be provided through E-List (a Web-enabled contemporary reference
service offered to the registered members), online groups, blogs, RSS, E-Mail, SMS, etc. The
steps involved in CAS may be of the following types
i) Creation of User Profile: The profiles of the user, who are to be given CAS/SDI service, are
prepared. A profile consists of the key words that collectively characterize the subject interest of
an individual. The profile can be of a single user or a group working on the same project or some
limited subject field. The profile obtained thus must be kept up-to-date. Therefore, if the topic of
inertest changes then the corresponding profile must also be modified accordingly.
ii) Acquisition of Resources: The different sources of information, periodicals, research papers,
which are relevant to the parent body, must be selected and collected from different sources. In
the next step, through rapid reading the resources are scanned by the LIS professionals to find
out the key concepts.
iii) Creation of Document Profile: The relevant and significant information is recorded in the
form of content list for different contexts. The recorded information may be in the form of an
abstract or an extract. Depending upon the significance of the document, the bibliographical
details and indexing terms and the information itself are stored on the file / magnetic tape /
computer document.
iv) Matching Profile: In a regular interval, the user profile should be correlated or matched with
the document profile. The computer compares the two inputs; the output is printed out in the
form of two cards. One card is called information card that contain either the list of document or
the information itself along with bibliographical details of document which also has a tear off
strip request note. The other card is called response card.
v) Notification / Information Communication: If there exists any matching between the two
profiles then the matching information is sent to the user or group of users, who may require it,
through different means of communication in anticipation, like telephone calls, postal mail /
email / SMS with a request to call at the reference desk to get the pertinent information. In case
of postal communication, the two cards are sent to the user. The information can also be sent
through a messenger.
vi) Feedback Mechanism: The user keeps the information card for his use. In case he wants to
consult the document, he tears off the request note strip and sends it to the library along with the
response card, in which he indicates the degree of interest in the particular document.
vii) Library Action: The library takes action on the request note strip to send the document(s) to
the concerned user or to keep it in the library for him. The response card helps the library to
know about the usefulness of the information provided as well as the shift in the information
need. The library accordingly modifies the user profile page for improving performance.
2.2 Selective Dissemination of Information (SDI) Service: SDI is a refinement of CAS service
which is directed to individual / personal requirement (personalized). It provides a deeper
analysis of literature. If two people exactly match in terms of their interest, then SDI also can be
provided to the two people. H.P. Luhn is a pioneer in this field. The steps in providing SDI
services are same as that of CAS, the difference is only in the depth of the interest.
The aim of SDI is to see that the user should neither be provided too much of information
nor made to miss information essential for his requirements. It should also meet the user need at
individual level.
SDI service may take the following forms-
i) Contents Alerts: This service is provided by photocopying, scanning the content pages of
learned journals and other important publications keeping in view the interest of the users.
ii) Routine of Periodicals (Automatic Loan): In this procedure, the current issues of periodicals
are routed. There are two systems of routing the current issues of the periodicals. In the first
method, the library sends the current issue to the first person on the last, who passes it on to the
next name in the list. The last person in the list returns the periodical to the library. In the second
method, the library sends the issue to the first person on the list, who returns it to the library, and
then the library sends it to the next person on the list, who again returns it to the library. Next the
library sends it to the third person, and the system goes on like this.
iii) Notification of Forth Coming Conferences, Seminars, etc.: The information about
forthcoming meetings, conferences, symposia, seminar, workshop etc. on a specific field should
be notified to the members belonging to that specific domain. Keeping this purpose in view some
library provides this kind of service to the user.
2.3 Liaison Service: In Liaison service, the library professionals go to the users to identify the
problems encountered by them in course of their activities, analyze their information need, and
put them in touch with the information sources or services.
2.4 Let Us Sum Up: An efficient library service does not merely depend on its stock and staff
but also on the awareness and attraction of the clients to the services offered by the library. It is a
prime responsibility, therefore, of the librarian to effectively interpret its activities to the public.
Computerized Current awareness services began with bibliographic databases that
contained references to periodicals, books, and other documents. Services then were expanded
to include online catalogues, CD-ROM sources, networking of libraries and library systems, full
text retrieval, and the Internet.
Public relation is as much a part of the daily life of the library as of any business, perhaps
more so, as the library is not self supporting and primarily depends even more than the usual
business, on the good wishes of its patron. The precisely stated public relation and extension
service of the library is the task of lending or delivering books and other forms of information to
the users who are distant from a library or who may be relatively near it but somehow unable to
travel to it. Staff news sheet, exhibits, guides to exhibit are all part of a library publicity
programme. Libraries can also supplement and complement the mass media of communication
i.e. Newspaper, Press, Radio, Television, Cinema for public relation.
Public Library or Public Lending Library
Public Library or Public Lending Library: These libraries provide service to the general
public and make at least some of their books available for borrowing, so that readers may use
them at home over a period of days or weeks. Typically these libraries issue library cards to
community members wishing to borrow books. Many public libraries also serve as community
organizations that provide free services and events to the public, such as babysitting classes and
story time. The public library system has rural library at its base to provide services to the rural
population.
Public libraries exist in most nations of the world and are often considered an essential
part of having an educated and literate population. It fosters and provides means for maintaining
individual’s individuality, helps in the progressive development of individual’s personality, and
individual’s acquisition of know how of daily life. It believes that a good reader is a better citizen
and an asset to the community.
a) Definition: A library that is open to the general public and that provides general library
services without charge to all residents of a given community, district, or region and is supported
wholly or in part by public funds is the public library. It may be operated by civil servants. Public
libraries are often funded (mostly) by taxes. Besides maintaining material collections, they
usually play community role. Considering all these facts the public library is called the people’s
university. Each individual in this university begins at his own level and progresses at his own
speed. Today, by public library, we mean a library with the following chief attributes-
i) Open to all without any distinction of caste, creed or sex;
ii) Free of any charge either in the form of security deposit or membership fee;
iii) Financed from public funds received by way of library rates and government grants;
iv) Supported by library legislation.
Benjamin Franklin not only looked upon the public library as an educational institution
and used it as one, but went further to define it as an institution for the diffusion of knowledge to
the end that people could control their own destinies and become better citizens.
According to Ranganathan, the public library is established out of the public fund; it
serves the general public of its locality; and it is essentially a service library.
The UNESCO Manifesto clearly states that “the public library should be established under the
clear mandate of law, so framed as to ensure nation-wide provision of public library service”. In
short, a public library is a free library for the public, by the people and of the public. According
to the UNESCO Public Library Manifesto 1994 (Revised), "the public library acts as a living
force for education, culture and information and as an essential agent for the fostering of peace
and spiritual welfare through the minds of men and women".
b) Objectives: The UNESCO Public Library Manifesto first issued in 1949 and revised in 1972
by the International Federation of Library Associations and Institutions on the occasion of
International Book Year is a broad charter of public library goals. The purposes and objectives of
the public library are described in relation to three basic concerns-
- The needs of people who use the libraries;
- The need to ensure that the library is located in suitable site; and
- The need to provide for effective means of operating it and developing its services.
c) Collections: Public library should try to procure books on most of the main subject areas. In
promoting the culture of the community the public libraries should include works of disinterested
pursuit of truth, beauty or goodness, even though it is always mixed up with other motivations
such as search for social importance (knowledge is power), or for status and acceptance, or for
comfort of a dream world, for the individual self-realisation. Its contents should be a living
demonstration of the evolution of knowledge and culture, constantly reviewed, kept up-to-date
and attractively presented. It should also include works on literature, art, philosophy, history,
biography and topology. In facilitating non-formal education or self-education, public library
should provide educational materials which include introductions or standard works on a subject.
Most users of the public library read for recreation at one time or another and the provision of
this kind of reading is essential. Public libraries not only collect books and periodicals but also
procure other graphic, holistic and acoustic material such as books and journals, maps and charts,
microfilm and the like all designed for use. Today, public libraries have a wide array of other
media including CDs, software, video tapes, and DVDs, as well as facilities to access the
Internet.
d) Services: The public library is planned so as to become the hub of social life, a real
community centre around which the daily life and habits of the people are geared. The main
function of public libraries is to serve the public's information needs generally. The public library
must offer adults and children the opportunity to keep in touch with their times, to educate them-
selves continuously and keep abreast of progress in the sciences and arts. It should also help
people to form their own opinions, and develop their creative and critical capacities and powers
of appreciation. For illiterates or neo-literates it needs to organize the audio-visual or mass media
communication.
Public libraries are typically lending libraries, circulating book and other materials to the
users; they also have non-circulating reference collections. It typically focuses on popular
materials such as popular fiction and videos, as well as educational and nonfiction materials of
interest to the general public; in the larger cities, they are to some extent reference libraries as
well. Public libraries also provide materials for children, including books, videos and other
materials (both fiction and nonfiction), often housed in a special section. Public libraries may
also provide services for other particular groups, such as large print or Braille materials, young /
adult literature and other materials for teenagers, or materials in other than the national language.
Librarians at most public libraries provide reference and research help to the general
public, usually at a reference desk. Depending on the size of the library, there may be more than
one desk; at some smaller libraries all transactions may occur at one desk, while large urban
public libraries may employ subject-specialist librarians to sit at multiple reference or
information desks to answer queries about particular topics. Often the children's section in a
public library has its own reference desk.
Public libraries may also provide other services, such as community meeting rooms,
children’s story time or after-school programme, and space for homework help programmes or
other community services. In some countries it pays authors when their books are borrowed from
libraries. These are known as Public Lending Right programmes.
Properties of Information
Properties of Information: Information has an origin. It is communicated from the origin or
from a “source” where information is termed as “message”. The message needs a “medium” for
communication. The message is aimed to be communicated to a “recipient”. At each step the
information possesses certain characteristics. Some of the characteristics or properties of
information are listed below
a) General Characteristics
i) Information is Heterogeneous: Information is extremely heterogeneous with virtually infinite
variation in response to individual conjunctions of supplier, processor, user and channel of
communication. It is inter-disciplinary in nature.
ii) Information Itself is Valueless: Information is rarely of value in itself. It always requires a
content structure or model within which it can be interpreted.
iii) Information is Central: The role of information in any organization is central and can be
viewed as a fundamental factor of production like money and manpower.
iv) Protection: The supplier and the user of information often need special protection by means
of government intervention such as copyright and patent laws, privacy legislation, fraud statutes,
etc.
v) Demand Varies: Demand for information is a function of such variables as age, perishability,
convenience, reliability, source, etc.
vi) Un-destroyable: Information is not consumed in its use.
vii) Shareable: It can be shared by many and can be used simultaneously without any loss to
anyone.
viii) Democratic Resource: Information is the best democratic resource that can be consumed
by the poor and the rich alike depending upon their intake capacity.
b) Characteristics at the Source of Origin
i) Reliable and Genuine Source: When information is received from a valid, reliable and
genuine source then only it should be considered for communication to the recipient or end user.
ii) Communicability: Information should be in a communicable form.
c) Characteristics as a Message
i) Accuracy: Information should be precise and free from error.
ii) Timeliness: The information should be timely. To achieve this modern electronic device can
be used.
iii) Completeness: Information as a message should include all the relevant information.
iv) Explicitness: The message should not leave any doubt in the mind of the user as to its
validity, comprehensiveness, etc.
v) Availability and Accessibility: Information must be available and readily accessible to the
user.
vi) Verifiability: The message must be verifiable so that its validity, accuracy, appropriateness,
etc can be assessed.
vii) Bias free: Information should be free from any kind of bias.
d) Characteristics at the end of the Recipient
i) Adaptability: Information should be adaptable for a new use, need, situation, etc.
ii) Cost Effectiveness: Information should improve the performance of a system at an acceptable
cost or at no cost or should reduce the cost without unduly effecting performance.
iii) Currency: The information should be timely available. It should not be obsolete as well.
Timely information will be of high value.
iv) Relevance: Information should be relevant to the user.
v) Conciseness: Information should summarize the relevant data so that it will be useful for the
managers.
Processing of Books
Processing: Cataloguing is followed by the processing phase. The processing transforms a
collection of books into serviceable items, thus making books fit for use.
a) Stamping: It is necessary to put a library stamp on lower half of the title page, bottom of the
last page of text, bottom of the last page of the volume, and the secret page. In addition each
plate, map and other pages not included in pagination should also be stamped. The stamp should
be put properly and carefully without falling on the printed matter. The stamp should contain the
name of the library and its address.
b) Tagging: Paste a tag (spine label) on the back of the volume, after removing the jacket, if any.
It should be fixed one inch above the bottom of the spine of the volume. This is done so that the
call number may be properly visible to the readers when the book is shelved in a books rack.In
case the volume is not thick enough to allow space for a tag then apply it on the front cover close
to the back. Gummed white cloth is cut into round or square pieces of about 1.25 each to make
the spine label where class no., book no and location mark of the book are written. The location
marks are written on the left hand upper portion of the label. Such marks may be Reference,
Rare, Text Book, etc.
c) Date Labelling: A date label or slip should be pasted on the first page after the cover. It
should be fixed symmetrically and pasting should be done only along the top edge. In case of
reference books, manuscripts and other books which are not to be issued, this slip is not pasted.
d) Book Pocket Fixing: Near the right hand bottom corner of the inside of the front cover of the
book, the pocket should be fixed. For reference and other non–issuable books, this pocket is not
pasted.
e) Book Card: One printed book card of 5X 3 cm size is put in the book pocket of each book.
f) Fixing Ownership Slip: Ownership slip is generally pasted on the inner side of the front cover
at left hand top most corners. The slip may be of 3 X 2.5 cm, made of glazed paper. It may be
printed giving the name of the library, its logo, class number, book number, and accession
number.
g) Entering Call Number: The call number should be written in pencil at the back of the title
page and also on the secret page to be decided by the library. Call number can be written in ink
over tag, date label and book card to be put in the book pocket.
h) Entering Accession Number: Accession number is to be added on the date label, book card
and to the written near the book pocket.
i) Filling Book Card: Author, title, edition and year of publication are written on the book card.
j) Checking: All the call numbers and catalogue entries must be carefully checked. Any
mistakes found must be corrected.
k) Filling of Cards: The catalogue cards should be taken out from the books. From the main
cards, a list of latest additions can be prepared. It is a list of books added to the library. A
mimeographed or printed list can be distributed widely.
The catalogue cards except the shelf cards should be filed in the public catalogue. Shelf
cards should be filed in the shelf list. At this stage, the books can be released for display for a
week and then merged in the general collection. Book releasing work also includes making lists
of new additions or accession list. The accession list may be put up on the notice board and the
printed or cyclostyled ad copies are to be mailed to members, or published in the weekly editions
of library newsletter, etc.
Principles of Management
Principles of Management: Principles of Management are generalization based on experience
and careful analysis of case studies. These are universally applicable. These are not rigid; change
in circumstances would require adoption of these.
Principles of management are a powerful tool in the hands of a manager but these must
be used rather carefully after analysis of the problem and its diagnosis. Good management can be
learned only through practice and by solving problem rather than by memorization of principles
which may have only limited relevance to actual problem.
Henri Fayol was the first to put forward a list of general administrative principles. On the
whole, his observations are valid, even today. Fayol used scientific approach. Fayol formulated
the following fourteen management principles. These are the first categorized on management
and these have not lost their relevance in modern management policy. These are the basic
management principles.
i) Division of Work: In any organization the division of work, duties, and activities is a must.
The division of work lead to specialization. If possible only that work should be assigned to a
person in which field he has specialization. The principles of division of work are based on
common principle of experience that every person cannot do every job.
ii) Authority and Responsibility: An individual should be given authority equal to his
responsibility. Possession of authority means responsibility for actions. Actual work in the library
may be done by different persons but the ultimate responsibilities lie with the chief librarian. The
responsibilities without authority will lead to lack of confidence.
iii) Discipline: Discipline encompasses regularity, behaviors, conduct and interpersonal
relationship among the staff workers. In the best interest of the organization there should be
complete obedience, diligence, energy and outward marks respect. This is equally applicable to
everybody.
iv) Unity of Command: An organizational structure should be such that each employee is
supervised by only one supervisor. An employee should be responsible to and also receive orders
from only one superior. The command should generally come from the immediate superior.
v) Unity of Direction: In a planned administrative setup, direction should come from one end
and one person should be responsible for similar type of jobs.
vi) Subordination of Individual’s Interest to General Interest: Where there is a conflict of
general interest with individual interest, general interest should get the priority over the
individual interest. It is desirable in any social order.
vii) Remuneration: Remuneration should be reasonable and should commensurate to the
qualification, experience, technical knowledge, seniority, performance and such other factors.
Employees should be given incentives for successful efforts.
viii) Centralization: There should be judicious distribution of work of the library in terms of
centralization and decentralization. Anything that increases the importance of the role of a
subordinate should be decentralized. On the other hand any thing that decreases the importance
of the role of a subordinate should be centralized. For example book selection and managerial
function should be decentralized because in case of book selection the heads of the departmental
libraries knows more about their field of specialization. But ordering should be centralized so
that there is no duplication of bibliographical tool.
ix) Scalar Chain: This refers to hierarchy. A hierarchy consists of a series of steps extended in
an unbroken line from the chief librarian to the lowest employee. This principal implies that
authority and responsibility should flow in a clear, unbroken line from the highest executive to
the lowest rank. Orders go down the line traveling from top to bottom. However, information and
appeal travel in the reverse direction.
x) Orders: Orders indicate the disciplined flow of discharging the respective duties and the
systematic organization of work flow. It refers to the best possible management to achieve the
most efficient operation of the organization.
xi) Equity: In dealing with employees treatment of equality must be put into practice. Justice
must be combined with friendliness and kindness by those in the executive towards staff.
xii) Stability of Tenure of Personnel: Stability of tenure indicates a longer service period of an
employees and uninterrupted working period. It assures better service, steady growth and
systematic planning of work schedules. Rapid turnover of staff can cause anxiety.
xiii) Initiative: One should not only do his job assigned to him, but he should feel inspired to
perform his duties. In working situation anybody may have suggestion for improvement and
better work or redesigning the works schedule for better result, all the suggestion should be taken
with trust by the management. Due attention, proper consideration should be given to them. This
will inspire the person working with incentives and ultimately institution will get better result.
xiv) Esprit de Corps: The management should create environment which leads to harmony and
unity. The entire employees should not feel as an assemblage of individuals but recognize their
identity with the institution. Thus a sense of co-operation, a sense of belonging, a feeling of
identification with the institution, a corporate sense over self, a team spirit, a feeling of unity
make the institution as a organic whole.
Besides the principles put forward by Fayol, other principles often included are as
follows-
xv) Span of Control: This refers to the persons with whom a manager must deal directly. For
efficient management there should be a few people to be controlled directly by each head.
xvi) Coordination: Aim of co-ordination being to achieve harmony of individual efforts toward
accomplishment of group goals. Co-ordination is concerned with interrelating of the various
parts of an organization so that all procedures, operation and activities lead to maximum
contribution to the person to person relationship. Co-ordination in an organization is balancing
and interrelating of the various parts of an organization and keeping together all the staff for
getting best result with the minimum resources at hand.
xvii) Accountability: Accountability means liable to account. In any organization, the emphasis
should be given to measure the quality and quantity of performance.
Preservation and Conservation of Library Materials
Preservation and Conservation of Library Materials: The library houses the document by
considering the long-term preservation of the items while still allowing the end user to access the
material easily. But all library collections experience damage from use and decay from aging. So
there is a need of preservation and conservation of library materials.
Books and other materials suffer damage or deterioration because of several groups of
factors, some inherent in the materials and others beyond the control of the library. Library
holdings may begin to deteriorate because of the organic materials from which they are made.
Each type of material - paper, glue, plastic, etc. - that goes into the manufacture of a book,
recording or optical media has its own combination of physical and chemical properties, and a
life span. The other factors include all of the conditions surrounding the processing, storage and
use of the materials.
Preservation is the task of minimizing or reducing the physical and chemical deterioration
of documents. Conservation is the maintenance of documents in a usable condition through
treatment and repairs of individual items to slow the process of decay or to restore them to a
usable state. Conservation includes study, diagnosis, preventive care, examination, treatment,
documentation using any methods that may prove effective in keeping that property in as close to
its original condition as possible and for as long as possible. The conservation actions are carried
out for a variety of reasons including aesthetic choices, stabilization, needs for structural
integrity or for cultural requirements for intangible continuity.
a) Need of Preservation and Conservation: When an important, often used book is found in a
poor physical condition that restricts its future use and denies the borrower the pleasure of its
reading, then the need arises for its preservation and conservation. The need of preservation and
conservation are-
i) Compendium of Information: Books, journals, newspapers are the sources of information.
They reflect social, economic, political and cultural life. They also depict the latest trend on all
subjects or topics and, as such, they are a valuable asset of our society.
ii) Raw Materials of History: The old reading material constitutes the raw materials of our
history and provides background information about an event in history. Nostalgia for such works
is another point of consideration.
iii) Wide Range of Users: Everyone from a child to an old man, from layman to researchers, turns
to information even after hundred years of the publication of the material.
iv) Future and Heavy Use: Hard copies of the old as well as new materials are prone to decay.
So, to provide continuous and wider access to the collection preservation is a must.
v) Rare Materials: Manuscripts and other materials are of immense value from the cultural and
historical point of view and therefore they need to be preserved. Priority should be given to high-
value, at-risk materials of national interest. The purpose shall be to serve preventive preservation,
as well as security, goals by reducing the handling of the originals.
b) Strategies in Preservation and Conservation: The strategies in preservation and
conservation of library material can be viewed in the form of following points-
i) Document Selection: If preservation and conservation practices will be followed then the goal
should be to bring as many worthy collections as possible for the document at risk to improve
access.
ii) Options: Choosing the options that will be followed to meet the requirements of the custodial
function of the library as well as its current use.
iii) Budget: Preparing a budget for the preservation and conservation of the reading materials,
including cost in procuring equipments, and others.
iv) Procuring Necessary Infrastructure: According to the option chosen for preservation
necessary infrastructure should be developed. In case of digital preservation necessary hardware
and software should be procured. If possible the archive or library can go for automated
management systems that will manage digital resources for acquisition, use, and archiving
automatically.
v) The Conservation Laboratory: Conservators routinely use chemical and scientific analysis for
the examination and treatment of the works. The modern conservation lab uses equipment such
as microscopes, spectrometers, and x-ray machines to understand better the objects and their
components. The data thus collected help in deciding the conservation treatments to be provided
to the object.
c) Types of Preservation and Conservation Techniques: The preservation and conservation
techniques can be of the following types:-
i) Preventive Conservation: Many cultural works are sensitive to environmental conditions such
as temperature, humidity and exposure to light and ultraviolet light. Taking sufficient measures
to protect materials in a controlled environment where such variables are maintained within a
range of damage-limiting levels is called preventive conservation.
ii) Interventive Conservation: Interventive Conservation refers to any act by a conservator that
involves a direct interaction between the conservator and the cultural material. These interventive
treatments could involve cleaning, stabilizing, repair, or even replacement of parts of the original
object or consolidation such as securing flaking paint.
d) Ethics in Conservation: The conservator applies some simple ethical guidelines, such as:
i) Minimal Intervention: It is essential that the conservator should fully justify the intervention
for conservation if necessary before the work is undertaken and if necessary after the work is
over.
ii) Reversible Methods: Using appropriate materials and methods that aim to be reversible to
reduce the possible problems with future treatment, investigation, and use is one of the guiding
principles of conservation. It means, that all interventions with the object should be fully
reversible, and the object should be in a position to be returned to the state in which it was, prior
to the conservator’s intervention. This principle nowadays has been widely criticized within the
conservation profession itself.
iii) Complete Documentation: Complete documentation of the work carried out before, during,
and after the treatment is necessary. It is a must for all kinds of documents as it will provide what
was done with the document in the past and accordingly it helps in taking the right decision in
future treatment process.
Presentation of Data
Presentation of Data: Diagram attracts the human mind more, compared to numerical figures,
which causes one to pause for a while to have a glance at the diagram and thus can get an overall
ideas of the said data. In practice a very large variety of diagrams are in use and new ones are
constantly being added. In the following only more frequently used diagram are discussed.
1. One Dimensional: The one dimensional representation of data includes different types of bar
diagram.
a) Simple Bar Diagram: To draw a simple bar diagram, equidistant bars each of equal width are
drawn on a line, one for each group of data. The value of each group is represented by the height
of the corresponding bar generally, in case of time based data, vertical bars are drawn and to
represent space based (or other) data horizontal bars are drawn. A simple bar diagram is used to
represent only one variable.
b) Sub Divided Bar Diagram: The sub divided bar diagram is used if the total magnitude of the
given variable is to be divided into various parts or components. The method of drawing this
type of diagram is same as that of the bar diagram, only the bar drawn should be divided into
various segments, according to the given components of the total.
c) Multiple Bar Diagram: To represent two or more numerical characteristic by the same
diagram, multiple bar diagram is to be used. A multiple bar diagram is obtained by drawing a
number of equidistant vertical set of bars on a line. Each set of bars contain two or more adjacent
bars. Width of the bars is same and height of the corresponding bars is to be taken in the ratio of
the numerical figure which is denoted by that bar. The total numbers of set of bars are taken to be
equal to the total number of items.
d) Percentage Bar: Percentage bars are particularly useful in statistical work which requires the
portrayal of relative changes in data. When such diagrams are prepared the length of the bars is
kept equal to 100 and segments are cut in these bars to represent the components (percentage) of
an aggregate.
e) Deviation Bar: Deviation bars are popularly used for representing net qualities – excess or
deficit, i.e. net profit, net loss, net export or imports etc. such bars can have both positive and
negative values. Positive values are shown above the bars line and negative values below it.
2. Two Dimensional: In two dimensional diagrams, the length as well as the width of the bars is
considered. Thus the area of the bars represents the given data. Two dimensional diagrams are
also known as surface diagram or area diagram. The important types under this category are-
a) Rectangles: In constructing rectangle one may represent the figures as they are given or may
convert them to percentage and then subdivide the length into various components. The area of a
rectangle is equal to the product of its length and width, so in constructing a rectangle both
length and width are important.
b) Squares: The rectangular method of diagrammatic presentation does not look good when the
values of item vary widely. So, in order to overcome this difficulty squares method are used. In
this method one has to take the square root of the values of various items that are to be shown in
the diagrams and then select a suitable scale to draw the square.
c) Circles: In Circles both the total and the component parts or sector can be shown. Since the
area of a circle is preoperational to the square of its radius, so in the construction of circles, the
square root of various figures are worked out, and the radii of the circles drawn are proportional
to the square root of the figures.
d) Pie Diagram: For constructing a pie diagram the various components values of data are
transposed into corresponding degrees on the circle, and then the diagram obtained by dividing a
circle into various sector is known as circle or pie diagram. The number of sector should be equal
to the total number of components parts. The area of the sectors should be taken in the ratio of
the values of the constituent parts.
3. Three Dimensional: Three dimensional diagrams are also known as volume diagrams. In
such diagram, three things namely length, width and height have to be taken into account. Such
diagrams are used where the range of difference between the smallest and the largest values is
very large. It includes cube, cylinder and sphere. Amongst three dimensional diagram, cubes are
most popular and also simple to draw. The side of a cube is drawn in proportional to the cube
root of the magnitude of data.
4. Others: Some other tools that can be used to represent data are -
a) Pictographs: Pictures are attractive and easy to comprehend and as such this method is
particularly useful in presenting statistics to the layman. In pictograph the data are represented
through a pictorial symbol, which is very carefully selected, so pictographs depict the kind of
data we are dealing with.
b) Cartogram: Cartograms or statistical maps are used to give quantitative information on a
geographical basis. They thus represent spatial distributions. The quantities on the map can be
shown in many ways, such as through shades or colors, by dots, by placing pictograms in each
geographical unit and by placing the appropriate numerical figures in each geographical unit.
c) Graphs: When we observe the values of a variable at different points of time, the series so
formed is known as time series. Time based data can be represented by line diagram. In this case,
points are plotted on the graph paper by taking time as X co-ordinate and the data corresponding
to that particular time as Y co-ordinate. After that, by joining the points in pairs by line segment,
line diagrams are drawn.
d) Histogram: Histogram consists of a series of adjacent vertical rectangles, drawn and each of
each class intervals. Area of each rectangle determines the frequency of that class. Generally for
the graphical representation of frequency distribution of continuous variable histogram is used.
To draw histogram, firstly class intervals are marked along horizontal axis (X-axis) and
frequencies are to be marked along vertical axis (Y-axis) after that taking, difference between
lower and upper boundaries as base rectangles are drawn one for each class recording to the ratio
of the area of the frequency. Since the area of the rectangles having same base are proportionate
to the length, therefore, in case of frequency distribution having equal class width, the height of
the rectangles should be taken in the ration of the frequencies.
e) Frequency Polygon: To draw frequency polygon, points are plotted on the co-ordinate plane
by taking the mid value of a class as X co-ordinate and corresponding frequency of the class as Y
co-ordinate. The points are then joined in pairs represented by a line segment. The polygon is
closed at both ends, by extending it to the mid-points of two classes having frequency zero,
before the first class and after the last class.
f) Smoothed Frequency Curve: The smoothed frequency curve is drawn freehand in such a
manner that the area included under the curve is approximately the same as that of the polygon.
The object of drawing a smoothed frequency curve is to eliminate as far as possible accidental
variations that might be present in the data.
g) Cumulative Frequency Curves or “Ogives”: Cumulative frequency curve is a smooth curve.
To draw this curve, points are plotted on the graph paper by taking upper class boundaries as X
co-ordinate and cumulative frequency of the respective class as Y co-ordinate. The points so
obtained are joined by a smooth free hand curve. This curve is joined to the lower class boundary
of the first class. The smooth curve drawn in this manner is called the cumulative frequency
curve.
2. Layer 7: Application Layer: The application layer interfaces directly to and performs
common application services for the application processes; it also issues requests to the
presentation layer. Note carefully that this layer provides services to user-defined application
processes, and not to the end user. For example, it defines a file transfer protocol, but the end
user must go through an application process to invoke file transfer. The OSI model does not
include human interfaces.
The common application services sub layer provides functional elements including the
Remote Operations Service Element (comparable to Internet Remote Procedure Call),
Association Control, and Transaction Processing (according to the ACID requirements).
Above the common application service sub layer are functions meaningful to user
application programs, such as messaging (X.400), directory (X.500), file transfer (FTAM),
virtual terminal (VTAM), and batch job manipulation (JTAM). These contrast with user
applications that use the services of the application layer, but are not part of the application layer
itself.
File Transfer applications using FTAM (OSI protocol) or FTP (TCP/IP Protocol)
Mail Transfer clients using X.400 (OSI protocol) or SMTP/POP3/IMAP (TCP/IP protocols)
Web browsers using HTTP (TCP/IP protocol); no true OSI protocol for web applications
3. Layer 6: Presentation Layer: The Presentation layer transforms the data to provide a
standard interface for the application layer. MIME encoding, data encryption and similar
manipulation of the presentation are done at this layer to present the data as a service or protocol
that the developer sees fit. Examples of this layer are converting an EBCDIC-coded text file to
an ASCII-coded file, or serializing objects and other data structures into and out of XML.
4. Layer 5: Session Layer: The Session layer controls the dialogues/connections (sessions)
between computers. It establishes, manages and terminates the connections between the local
and remote application. It provides for full-duplex, half-duplex, or simplex operation, and
establishes check pointing, adjournment, termination, and restart procedures. The OSI model
made this layer responsible for "graceful close" of sessions, which is a property of TCP, and also
for session check pointing and recovery, which is not usually used in the Internet protocols suite.
Session layers are commonly used in application environments that make use of remote
procedure calls (RPCs).
iSCSI, which implements the Small Computer Systems Interface (SCSI) encapsulated
into TCP/IP packets, is a session layer protocol increasingly used in Storage Area Networks and
internally between processors and high-performance storage devices. iSCSI leverages TCP for
guaranteed delivery, and carries SCSI command descriptor blocks (CDB) as payload to create a
virtual SCSI bus between iSCSI initiators and iSCSI targets.
5. Layer 4: Transport Layer: The Transport layer provides transparent transfer of data between
end users, providing reliable data transfer services to the upper layers. The transport layer
controls the reliability of a given link through flow control, segmentation/de-segmentation, and
error control. Some protocols are state and connection oriented. This means that the transport
layer can keep track of the segments and retransmit those that fail.
Although it was not developed under the OSI Reference Model and does not strictly
conform to the OSI definition of the Transport Service, the best known example of a layer 4
protocol is the Transmission Control Protocol (TCP). The transport layer is the layer that
converts messages into TCP segments or User Datagram Protocol (UDP), Stream Control
Transmission Protocol (SCTP), etc. packets.
Of the actual OSI protocols, not merely protocols developed under the model, there are
five classes of transport protocols, ranging from class 0 (which is also known as TP0 and
provides the least error recovery) to class 4 (which is also known as TP4 and is designed for less
reliable networks, similar to the Internet). Class 4 is closest to TCP, although TCP contains
functions, such as the graceful close, which OSI assigns to the Session Layer.
Perhaps an easy way to visualize the Transport Layer is to compare it with a Post Office,
which deals with the dispatch and classification of mail and parcels sent. Do remember,
however, that a post office manages the outer envelope of mail. Higher layers may have the
equivalent of double envelopes, such as cryptographic Presentation services that can be read by
the addressee only. Roughly speaking, tunneling protocols operate at the transport layer, such as
carrying non-IP protocols such as IBM's SNA or Novell's IPX over an IP network, or end-to-end
encryption with IPsec. While Generic Routing Encapsulation (GRE) might seem to be a network
layer protocol, if the encapsulation of the payload takes place only at endpoint, GRE becomes
closer to a transport protocol that uses IP headers but contains complete frames or packets to
deliver to an endpoint. L2TP carries PPP frames inside transport packets.
6. Layer 3: Network Layer: The Network layer provides the functional and procedural means
of transferring variable length data sequences from a source to a destination via one or more
networks while maintaining the quality of service requested by the Transport layer. The Network
layer performs network routing functions, and might also perform fragmentation and reassembly,
and report delivery errors. Routers operate at this layer—sending data throughout the extended
network and making the Internet possible. This is a logical addressing scheme – values are
chosen by the network engineer. The addressing scheme is hierarchical. The best known example
of a layer 3 protocol is the Internet Protocol (IP). Perhaps it's easier to visualize this layer as
managing the sequence of human carriers taking a letter from the sender to the local post office,
trucks that carry sacks of mail to other post offices or airports, airplanes that carry airmail
between major cities, trucks that distribute mail sacks in a city, and carriers that take a letter to
its destinations. Think of fragmentation as splitting a large document into smaller envelopes for
shipping, or, in the case of the network layer, splitting an application or transport record into
packets.
7. Layer 2: Data Link Layer: The Data Link layer provides the functional and procedural
means to transfer data between network entities and to detect and possibly correct errors that
may occur in the Physical layer. Originally, this layer was intended for point-to-point and point-
to-multipoint media, characteristic of wide area media in the telephone system. Local area
network architecture, which included broadcast-capable multi access media, was developed
independently of the ISO work, in IEEE Project 802. IEEE work assumed sub layering and
management functions not required for WAN use. In modern practice, only error detection, not
flow control using sliding window, is present in modern data link protocols such as Point-to-
Point Protocol (PPP), and, on local area networks, the IEEE 802.2 LLC layer is not used for
most protocols on Ethernet, and, on other local area networks, its flow control and
acknowledgment mechanisms are rarely used. Sliding window flow control and
acknowledgment is used at the transport layers by protocols such as TCP, but is still used in
niches where X.25 offers performance advantages.
Both WAN and LAN services arrange bits, from the physical layer, into logical
sequences called frames. Not all physical layer bits necessarily go into frames, as some of these
bits are purely intended for physical layer functions. For example, every fifth bit of the FDDI bit
stream is not used by the data link layer.
a) WAN Protocol Architecture: Connection-oriented WAN data link protocols, in addition to
framing, detect and may correct errors. They also are capable of controlling the rate of
transmission. A WAN data link layer might implement a sliding window flow control and
acknowledgment mechanism to provide reliable delivery of frames; that is the case for SDLC
and HDLC, and derivatives of HDLC such as LAPB and LAPD.
b) IEEE 802 LAN Architecture: Practical, connectionless LANs began with the pre-IEEE
Ethernet specification, which is the ancestor of the IEEE 802.3 This layer manages the
interaction of devices with a shared medium, which is the function of a Media Access Control
(MAC) sub layer. Above this MAC sub layer is the media-independent IEEE 802.2 Logical
Link Control (LLC) sub layer, which deals with addressing and multiplexing on multi access
media.
While IEEE 802.3 is the dominant wired LAN protocol and IEEE 802.11 the wireless
LAN protocol, obsolescent MAC layers include Token Ring and FDDI. The MAC sub layer
detects but does not correct errors.
8. Layer 1: Physical Layer: The Physical layer defines all the electrical and physical
specifications for devices. In particular, it defines the relationship between a device and a
physical medium. This includes the layout of pins, voltages, and cable specifications. Hubs,
repeaters, network adapters and Host Bus Adapters (HBAs used in Storage Area Networks) are
physical-layer devices.
To understand the function of the physical layer in contrast to the functions of the data
link layer, think of the physical layer as concerned primarily with the interaction of a single
device with a medium, where the data link layer is concerned more with the interactions of
multiple devices (i.e., at least two) with a shared medium. The physical layer will tell one device
how to transmit to the medium, and another device how to receive from it, but not, with modern
protocols, how to gain access to the medium. Obsolescent physical layer standards such as RS-
232 do use physical wires to control access to the medium.
The major functions and services performed by the physical layer are:
-Establishment and termination of a connection to a communications medium.
-Participation in the process whereby the communication resources are effectively shared among
multiple users. For example, contention resolution and flow control.
-Modulation, or conversion between the representation of digital data in user equipment and the
corresponding signals transmitted over a communications channel. These are signals operating
over the physical cabling (such as copper and optical fiber) or over a radio link.
Parallel SCSI buses operate in this layer, although it must be remembered that the logical
SCSI protocol is a transport-layer protocol that runs over this bus. Various physical-layer
Ethernet standards are also in this layer; Ethernet incorporates both this layer and the data-link
layer. The same applies to other local-area networks, such as Token ring, FDDI, and IEEE
802.11, as well as personal area networks such as Bluetooth and IEEE 802.15.4.
Interfaces: In addition to standards for individual protocols in transmission, there are also
interface standards for different layers to talk to the ones above or below (usually operating-
system–specific). For example, Microsoft Windows' Winsock, and Unix's Berkeley sockets and
System V Transport Layer Interface, are interfaces between applications (layers 5 and above)
and the transport (layer 4). NDIS and ODI are interfaces between the media (layer 2) and the
network protocol (layer 3).
OSI Service Specifications are abstractions of functionality commonly present in
programming interfaces.
Online Public Access Catalog (OPAC)
Online Public Access Catalog (OPAC): An Online Public Access Catalog (OPAC) is a
computerized online catalogue of the materials held in a library, or a library system. OPACs are
often part of an integrated library management system or software. The library staff and the
public can usually access it in computers within the library, or from home via the Internet. Since
the mid-1980s, it has replaced the card catalog in most libraries. Since the mid-1990s, character-
based OPAC interfaces are being replaced by Web-based interfaces. Today more complex
OPACs offer a variety of search capabilities on several indexes, integrate rich content (book
covers, video clips, etc.), and offer interactive request and renewal functionality.
Most integrated library systems offer a browser-based OPAC module as a standard
capability or optional feature. OPAC modules rely on pulldown menus, popup windows, dialog
boxes, mouse operations, and other graphical user interface components to simplify the entry of
search commands and formatting of retrieved information. Many libraries have their catalogues
accessible via Internet; some of them can be queried using a simple browser, other using a
special version of browser (with JavaScript and CSS features), and some others using Z39.50
clients. If one has few elements to identify a document, then he/ she can use a meta-searcher
where he/she can fill the query form once and spread his/her query over many library catalogues.
The OPAC has many advantages over card catalogues. It can store entries; it can add new
entries, withdraw entries and print out updated version of a catalogue in book, card or shelf form.
It can also be used to search and produce catalogue in CD, DVD, etc. It itself can be used as a
catalogue cabinet with enhance features i.e information can be stored within the computer and
kind of entries required can be easily got as and when required. It has also the facility to input the
data from the point of origin and output data can be transmitted directly to the place where it is
needed by using teleprocessing.
OPAC is more useful than the traditional card formats because:
i) The online catalogue does not need to be sorted statically. Here the user can choose the author,
title, keyword, or systematic order dynamically.
ii) Most online catalogue offer search facility for any word of the title. The goal of the
grammatical word order which is to provide an entry on the word that most users would look for
is reached even better.
iii) Many online catalogues allow links between several variants of an author’s name. So, authors
can be found both under the original and the standardized name (if entered properly by the
cataloguer).
Online cataloguing has greatly enhanced the usability of catalogues, and its origin from
the effort of MAchine Readable Cataloging (MARC) standards in the 1960s. The rules governing
the creation of catalogue MARC records include not only formal cataloging rules like AACR2
but also the special rules specific to MARC, available from the Library of Congress and also
OCLC.
Online Computer Library Centre (OCLC)
Online Computer Library Centre (OCLC): OCLC is a library network of USA. In 1967, the
presidents of the colleges and universities in the state of Ohio founded the Ohio College Library
Center (OCLC) to develop a computerized system in which the libraries of Ohio academic
institutions could share resources and reduce costs. It was established under the guidance of
library automation pioneer Frederic Kilgour. In 1977, the Ohio members of OCLC adopted
changes in the governance structure that enabled libraries outside Ohio to become members and
participate in the election of the Board of Trustees; the Ohio College Library Center became
OCLC, Inc. In 1981, the legal name of the corporation became Online Computer Library Center,
Inc (OCLC) <http://www.oclc.org/>.
a) Objectives: The objectives of OCLC are
i) To establish, maintain and operate a computerized library network and to promote the
evolution of library use, of libraries themselves and of librarianship;
ii) To provide processes and products for the benefit of library users and libraries;
iii) To Increase the availability of library resources to individual library patrons and to reduce the
rate-of-rise of library per-unit costs, and
iv) To further the ease of access to and the use of the ever-expanding body of worldwide
scientific, literary and educational knowledge and information.
b) Membership: Together OCLC member libraries make up the world's largest consortium.
More than 53 thousand libraries in 96 countries and territories around the world use OCLC
services to locate, acquire, catalogue, lend and preserve library materials.
c) Functions and Activities
i) Cataloguing and Metadata: OCLC offers full-service online cataloguing, simple copy
cataloguing, MARC record collections, offline cataloguing, customized OCLC cataloguing from
library’s materials vendor, automated copy cataloguing for materials purchased and custom
cataloguing serviced.
ii) Dewey Decimal Classification System: OCLC administers the Dewey Decimal Classification
system, the most widely used library classification system in the world. It also provides
WebDewey, the online version that is continually updated.
iii) Open WorldCat: WorldCat is the world’s largest bibliographic database. The Open WorldCat
programme makes it feasible to internet users who broadly search the Web at popular search
portals to discover materials owned by OCLC libraries. Current Open WorldCat participants
include Yahoo! Search (http://www.yahoo.com) and Google (http://www.google.com).
iv) OCLC Research: OCLC’s 25-year-old Research arm furthers the science of librarianship by
incubating new information access and exchange technologies, sponsoring the work of library
scientists and serving on global standards bodies (including those of the Dublin Core and Open
Archives initiatives).
v) Digitization and Preservation: OCLC’s digitization, microfilm and archival services are
designed to protect, share, and manage collections. The Intercat and Persistent Uniform Resource
Locators (PURLs) are such project of OCLC.
vi) Standardization: OCLC Terminologies Service provides single interface to access multiple
thesauruses. Access often-used controlled vocabularies such as mesh, gmgpc, gsafd, lctgm, ngl
and dct.
vii) Publication: OCLC regularly develops and publishes studies and other informational
documents that all libraries can use for "future-forward" planning. Recent reports include:
“2004 Information Format Trends: Content, Not Containers”, “The 2003 OCLC Environmental
Scan: Pattern Recognition”, etc.
viii) Mailing Lists and Forum: “WebJunction” is a Web-based community dedicated to the
emerging technology and training needs of librarians. It was funded by the Bill and Melinda
Gates Foundation’s U.S. Library Program, and coordinated by OCLC and other partners.
WebJunction feature articles, handouts, courses and forum discussions address the real issues
that librarians and library staff face everyday. OCLC also maintains groups and forums to foster
and maintain communication with its members.
ix) Others: NetLibrary provides full-text digital books, journals, newspapers and other published
works in hundreds of subject areas. NetLibrary, OCLC's eBook division, recently celebrated the
surpassing of the 58,000-title milestone. The Electronic Collections Online provides easy Web
access to thousands of full-text academic and professional journals.
The Online Computer Library Center (OCLC) is a nonprofit, membership based,
computer library service and research organization dedicated to the public purposes of furthering
access to the world's information and reducing information costs. Its Headquarters is in Dublin,
Ohio, USA.
Online Chat
Online Chat: Online chat refers to the text-based (keying or type words) communication
between two or more participants over the internet / intranet in real-time. Sometime it is also
known as synchronous conferencing, or Instant messaging (IM). Online chat is also referred to as
web chat. The expression online chat comes from the word chat which means "informal
conversation". In some chat program the users need to install some specialized software whereas
in some others, only the internet browser is necessary. There are also Graphical User Interface
(GUI) text-based chat rooms which allow users to select an identifying icon and to modify the
look of their chat environment.
Synchronous conferencing or Real Time Chat is the formal term used particularly in
computer-mediated communication, collaboration and learning, to describe online chat
technologies. Today it is also occasionally extended to mean audio/video conferencing or instant
messaging systems, provided that they also have a text-based multi-user chat function.
Synchronous conferencing protocols include Internet Relay Chat (IRC), Protocol for
Synchronous Conferencing (PSYC), Secure Internet Live Conferencing protocol (SILC),
Extensible Messaging and Presence Protocol (XMPP).
Chatiquette describes the basic rules of online communication. To avoid
misunderstanding and to simplify the communication between the users in a chat these
conventions or guidelines have been created. Chatiquette varies from community to community,
generally describing basic courtesy; it introduces the new user into the community and the
associated network culture. As an example, in Chatiquette it is considered rude to write only in
UPPER CASE, because it looks as if the user is shouting.
a) Types of Online Chat: Based on the number of users that participate in the chat it can be of
the following types-
i) 1 – on – 1 Chat: 1-on-1 or private chat refers to an environment where only two people share
their knowledge base.
ii) Group Chat: Here more than two people chat over an interface and share their thought.
Stranger Chat or anonymous chat is an environment where each other identity remains
hidden.
Chat can also be categorized based on cost factor as commercial or paid and free; based
on type of software used as Open Source (eg. Adium), and Proprietary (eg. Digsby).
b) Importance of Chat: Internet chat allows one to connect with people all over the world in
real time. The primary use of a chat room is to share information via text with a group of other
users. New technology has enabled the use of file sharing and webcams to be included in some
programs and almost all Internet chat or messaging services allow users to display or send to
each other photos.
Activity
c) Examples: There are thousands of chat programs available over the web. In the following,
some commonly used free chat services are listed. An expertise in two or three will be an added
advantage for you. We recommend you to use Google Talk or chat that is integrated with your
Gmail. To use this service, you can use your own Gmail id and password.
Sl No. Name URL
1) Adium (http://www.adium.im/)
4) Digsby (http://www.digsby.com)
5) Ebuddy (http://www.ebuddy.com/)
7) IMVU (http://www.imvu.com/)
8) KMess (http://kmess.org/)
9) Kopete (http://kopete.kde.org/)
13) QQ (http://www.imqq.com/)
f) Koha: Koha is the world's first open-source Integrated Library System (ILS) and it is
distributed free of cost (open source, and so no license fee, ever). It was initially developed in
New Zealand by Katipo Communications Ltd and first deployed in January of 2000 for
Horowhenua Library Trust. It is currently maintained by a team of software providers and library
technology staff from around the globe and is in use worldwide in the libraries of all sizes. The
name “Koha” comes from the Maori word for a gift or donation.
It runs on Linux, Unix, Windows and MacOS platform. Koha is a comprehensive system
that has the capacity to intelligently run a library, large or small, real or virtual. Koha is
compliance with copy cataloguing and z39.50, MARC21 and UNIMARC for professional
cataloguers. The software can also be used as document manager or digital library. Website:
http://koha.org/
g) Library Information and Management System (LIMS): LIMS is a unique library system,
designed, developed, implemented and fully tested by library professionals. It is distributed free
of cost to the libraries. Website: http://www.paklag.org/limsFreeware.htm
h) Library Manager: Library Manager is a library management software. It has been developed
under GPL licence. Website: http://libman.sourceforge.net/
i) LibSys 7: It is a web based library software product from Libsys Ltd., Gurgaon, Haryana. It
has the modules for acquisition, cataloguing, circulation, serials, article indexing, Web-OPAC,
and reports. It supports international standard like MARC21 (USMARC + CANMARC),
Unicode, SRU-SRW, Z39.50, NCIP-NISO, SICI-Barcode. If any library has the sufficient fund,
then it can be treated as the most field-proven library system in a wide spectrum of libraries with
unmatchable depth in functionality and features. Website: http://www.libsys.co.in/
j) NewGenLib: NewGenLib is an integrated library management system developed by Verus
Solutions Pvt Ltd. Domain expertise is provided by Kesavan Institute of Information and
Knowledge Management in Hyderabad, India. On 9th January 2008, NewGenLib was declared as
Open Source Software under GNU GPL Licence by Verus Solutions. It is estimated that 2,500
libraries across 58 countries are using NewGenLib as their Primary integrated library
management system. Website: http://www.verussolutions.biz
k) OpenBiblio: OpenBiblio is an easy to use, automated library system written in PHP
containing OPAC, circulation, cataloguing, and staff administration functionality. The software
is free. Website: http://obiblio.sourceforge.net
l) Sanjay: The NISSAT sponsored a project to DESIDOC for developing programmes on
UNESCO’s CDS/ISIS for enabling a library to do acquisition, circulation, etc. DESIDOC has
successfully modified the programmes and a new package based on CDS/ISIS was released in
1992 by the name of SANJAY. So, Sanjay is an augmented version of CDS/ISIS with modules
prepared for the various house keeping operations. The software is totally menu driven and
works in windows environment with LAN support. In India, NISSAT is the marketing agent of
this software. The package was released for marketing in September 1995.
m) Small Library Organizer Pro: It is a complete software for small private, public, or
corporate libraries. It able to manages all the library collections, member / patron information,
and keeps track of the library circulation data. The package has a separate module called
Designer. With Designer one can modify Small Library solution or can build their own. This is a
freeware. Website: http://small-library-organizer-pro.software.informer.com/1.0/
n) SOUL 2.0: Software for University Libraries (SOUL) is the state-of-the-art library
automation software designed and developed by the INFLIBNET Centre, Ahmedabad. It is a
user-friendly software developed to work under client-server environment. Looking at the name
of the software, one may think that it is meant for the university libraries only, but, in fact, it is
flexible enough to be used for automating any type or size of library. It is one of the best and
proven software for all types of libraries. Website: http://www.inflibnet.ac.in/soul/
o) WEBLIS: WEBLIS is a free-of-charge Web based Library Integrated System based on
CDS/ISIS. The system has been developed by the Institute for Computer and Information
Engineering (ICIE), Poland. The current version of WEBLIS, available in English, consists of
the cataloguing system, OPAC (search), LOAN module, and statistical module. WEBLIS runs
through the WWW-ISIS engine. More: http://portal.unesco.org/ci/fr/ev.php-
URL_ID=16841&URL_DO=DO_TOPIC&URL_SECTION=201.html
Library Consortia
Library Consortia: The basic premise of consortia is that its members can collectively achieve
more than what they can achieve as individual institutions.
a) Definition: According to American Heritage Dictionary a consortium is “a cooperative
arrangement among groups or institution,” or “an association or society”. According to Oxford
English Dictionary, “Consortium means temporary cooperation of a number of powers,
companies, etc. for a common purpose. It is an association of similar type of organization /
institution who are engaged for producing and servicing the common things / for providing
services for a specific purpose of its users.”
Library consortium is a “community (a cooperative) of two or more information agencies
which have formally agreed to coordinate, cooperate or consolidate certain function” to achieve
mutual objectives. It is an association of a group of libraries to achieve mutually the joint
benefits. It provides a way for its members to conduct business in a comparative manner.
Library consortia is a network for buying and accessing e- information in a cooperative
arrangement among a group of libraries in providing instant access to greater resources for the
users of the individual libraries. One of the libraries or agencies of the consortia works as
coordinator for identification of libraries for each publisher, negotiation, legal matters, etc.
Library consortia may vary from being decentralized to highly centralize in nature. The degree of
centralization of consortium is the primary factor affecting not only how member institutions
interact with one another, but also maintain relationship with external party (publisher/vendor).
More decentralized the consortium, the greater the degree of autonomy each member retains.
b) Precondition for Consortia: Technological developments, electronic publishing of scholarly
journals, emergence of consortia, pricing models of publishers are some of the factors that create
the condition for the development of the library consortia.
i) Emergence of Electronic Document: The whole world is moving towards electronic
publishing and the cost of the electronic publishing is much less than that of the print version.
The users also hope to have access to their learned journals article in electronic form.
ii) Access to Electronic Resources is a Precondition for a Modern Library: Library materials
have grown exponentially in many forms and formats like e-books, e-journals, etc. and all these
are very essential for the survival of the library itself.
The limitation in finance, space and manpower also stresses upon the need for library
consortia.
c) Benefit of Consortia: Library consortia increases the Cost Benefit Per Subscription. The
other advantages are:
i) Reduced Information Cost: Many libraries currently subscribe only to those journals that
they can afford. Though interested in other journals yet they cannot afford to provide access to
them. Consortia approach helps them to provide the access.
ii) Access to More Resources Than the Capabilities: A number of publishers offer consortia. If
the library’s purchase power is big enough they provide access to their whole range of journals –
that is, every member of the consortium gets electronic access not only to the journals currently
subscribed to but also to all the journals published in the field.
ii) Promoting the Rational Use of Funds: By forming consortia the purchasing power of the
collaborating institutions can expand the resource availability and offer automated services.
iii) Ensuring Continuous Subscription: The continuous subscription to the periodicals
subscribed is ensure in library consortia.
iv) DDS: Inter-libraries loan services will grow and it is interlinked with the search of the union
catalogues which will build effective DDS. Delivery of documents will be fast, either
electronically through Xeroxing, fax, courier or e-mail.
Consortia will give the library and also the user extended access- that is, better service for
reduced costs. With subscribed resources accessible online in electronic format, the member
libraries would have less pressure on space requirement for storing and managing print- based
library resources. Moreover, all problems associated with print media such as their wear and tear,
location, shelving, binding, organizing, etc. would not be an issue for electronic resources.
d) Development of Library Consortia in India: Library consortia has become quite popular in
India and many intuitions some of which are furnish below has made use of it.
i) Council for Scientific and Industrial Research (CSIR) e-Journals Consortium
<http://124.124.221.7>.
ii) The Forum for Resource Sharing in Astronomy & Astrophysics (FORSA)
<http://www.iiap.res.in/library/forsa.html>.
iii) Health Sciences Library & Information Network (HELINET)
<http://www.rguhs.ac.in/hn/newhell.htm>.
iv) Industrial Credit and Investment Corporation of India (ICICI) Knowledge Park
<http://www.iciciknowledgepark.com/>.
v) The Indian Institute of Management (IIM)’s Library Consortia.
vi) Indian National Digital Library in Engineering Sciences and Technology (INDEST)
Consortium <http://paniit.iitd.ac.in/indest/>.
vii) UGC-DAE Consortium for Scientific Research <http://www.tifr.res.in/~libws/>.
viii) UGC- INFONET <http://web.inflibnet.ac.in/info/ugcinfonet/ugcinfonet.jsp>.
ix) ISRO Library Consortium, ICMR Library Consortium, etc.
The library cooperation / resource sharing / networking / consortia or by whatever name we term
it aims to improve the existing organizational infrastructure of the participating libraries in terms
of finance, manpower, equipment, document, and other library facilities. It improves the
effectiveness and efficiencies of the participating libraries to serve the needs of the user,
improves access to resources, widens information coverage and accelerates the sphere in the
supply of information, and helps in utilizing the available resources to the optimum level.
Library Committee
Library Committee: A library authority may appoint a library committee, which is a body
consisting of persons who are assigned the job of looking after the library. The library committee
is needed because the librarian alone should not carry the whole burden of a big institution like a
library.
a) Members of the Library Committee: In case of a University, the library committee is
formed with the heads of the departments of the University, the Vice-chancellor, the Librarian,
etc. The Vice chancellor is the Chairman of the library committee, and the Librarian is the
Secretary. In case of college library, the principal is the chairman, and the librarian is the
secretary. In case of school library, there is no need of a library committee because the library
itself is a very small one and the librarian is the working head of the library.
The library committee should not be a very large. Only those people should be included
as members of the library committee who are interested in the library and in this way the
membership is restricted within the limit of twenty.
b) Types of Library Committee: There are mainly two types of library committees
i) Executive Committee: This committee is most powerful as it has full power over those matters
which are delegated to them by the library authority. So the decision of the library executive
committee is final and mandatory. It need not report its decision to the library authority.
ii) Advisory or Recommendatory Committee: It simply gives proposals which are subject to the
approval of the library authority.
If we go deep into the history of library committee we will also find some other types of
library committees. These are as follows:
iii) Self Perpetuating Committee: These committees have the sole authority and independence as
regards the control and management of the library under it. It does not have to report to any other
higher body about its activities.
iv)Adhoc Committee (Statutory Committee): It has the advantage of being independent of
politics. It takes decision expeditiously. This committee is more or less independent. The Madras
Public Library Act of 1948 provides the appointment of such a committee. This type of
committee serves as library authority.
v) Nominated / Elected Committee: A large committee or an authority nominates or elects a
smaller body for looking after certain bodies under it. It delegates certain power to such smaller
bodies or committees.
vi) Recommending Committee: It does not have any real power except that it simply gives certain
proposals which are subject to the approval of the library authority.
vii) Reporting Committee: This committee has sufficient powers to decide the matters within
certain limit. Such decision needs no confirmation of the supreme authority but the decision is to
be reported to the latter for information.
c) Powers and Functions of Library Committee: Powers and functions of a library committee
vary according to its nature. In case of the Executive Committee the powers, functions and
responsibilities are more whereas in case of a recommending committee, these will be narrowed
to a great extent. Almost all the proposals for discussion at the library committee meeting are put
forth by the librarian who generally acts as an ex-officio secretary to the committee. The library
committees generally serve the following purposes.
i) Library Building: Library committee plays a great role in the construction of the library
building and also makes necessary arrangement for the maintenance of the library building.
ii) Library Furniture and Fittings: Library committee ensures the availability of the adequate and
proper standard furniture so that in future any number of identical articles may be added without
any wastage of money or space.
iii) Library Staff: A library committee employs the qualified and adequate library staff for the
library.
iv) Library Rule: It frames a set of library rules and keeps them up-to-date.
v) Library Finance: The librarian not being an elected representative of the people cannot
successfully appeal for more fund allocation for the library. But the committee being a
representative body of the people can successfully and convincingly appeal for more funds. The
committee can also allocate the funds for the library.
vi) Collection of Documents: A library committee may appoint a sub-committee to serve as book
selection committee so that the lists of books are thoroughly scrutinized to avoid the purchase of
undesirable books.
vii) Library Accounts and Audits: A library committee provides the proper machinery for
checking the library accounts. It may appoint an account sub-committee for auditing the
accounts.
viii) Standard Library Service: A library committee put in its best efforts to secure full coverage
and standard library services to the users.
ix) Library co-operation: A library committee finds out ways and means of securing co-operation
between various branches within a locality and between other authorities.
x) Supervision and Advice: Public functions are best performed by a committee of persons who
may be elected or nominated out by the people themselves as such the library committees also
supervise and advise the librarian in matters on which public participation is essential.
xi) Buffer Agency: The committee serves as a buffer agency and an interpreter of the needs of the
library to the community, controlling and guiding the library activities. In the absence of a library
committee the librarian would find himself defenseless and unprotected.
Library Classification
Library Classification: Classification means putting together the like-entities and separating
the unlike entities. The characteristics of entities are used as a basis for determining the likeness
and unlikeness between them. A class consists of entities which are like in some respects and
possessing certain qualities in common. This helps in distinguish them from another class of
entities.
1. Definition: A library classification is a system of coding and organizing library materials
(books, serials, audiovisual, computer files, maps, photographs, manuscripts, regalia,
gramophone records, tape records, microfilm and so on) according to their subject. It provides
formal access to documents in a library.
Sayers defines library classification as “the arrangement of books on shelves or
description of them in the manner which is most helpful to those who read”. The emphasis is on
usefulness so that the users can locate the document without complication.
According to Margaret Mann, classification is “the arranging of things according to
likeness and unlikeness. It is the sorting and grouping of things, but in addition classification of
books is a knowledge classification with adjustment made necessary by the physical forms of
books.”
According to S.R. Ranganathan, “it is the translation of the name of the subject of a book
into a preferred artificial language of ordinal numbers and the individualization of the several
books dealing with the same specific subject by means of a further set of ordinal numbers which
represents some features of the book other than their thought content”. The first of these ordinal
numbers is called the class number of the book. The second ordinal numbers is called its book
number. The class number and the book number together constitute the call number of the book.
The library classification system provides a system for organizing the knowledge
embodied in books, CD, web, etc. It supplies a notation (in case of DDC, it is Arabic numerals)
to the document. The Dewey Decimal Classification (DDC) system is a general knowledge
organization tool that is continuously revised to keep pace with the development of knowledge.
It is the most widely used classification scheme in the world. Libraries in more than 135
countries use the DDC to organize their collection. It is also used over the web for organizing the
web resources for the purpose of browsing.
2. Need: Until 19th century, most libraries had closed stacks, so the library classification only
served to organize the subject catalogue. In the 20th century, libraries opened their stacks to the
public and started to shelve the library material itself according to certain library classification
scheme to simplify subject browsing. So classification is needed for providing the following
advantages
i) Helpful Sequence: Classification brings the like documents together on the shelf in a helpful
sequence providing approach through subject.
ii) Locate a Particular Document: A library collects / preserves documents. It is very difficult to
locate a required document from a system of disorderly collection. So, it needs classification to
bring order to the collection.
iii) Self Help: Classification helps the locating of document by the patron of the library itself,
thus requiring less assistance from the library staff.
iv) Correct Replacement: Documents would be taken out from shelves by the users or library
staff. The classification helps in the correct replacement of documents after these have been
returned from use.
v) Mechanical Arrangement: The classification helps the mechanization of the collection by
allocating notation.
3. Different Schemes of Classification: To derive the particular class number different libraries
use different classification schemes. All classification schemes can be categorized into three
kinds- based on the language, based on the synthesis and based on arrangement. Let us discuss
them in detail
Based on the language library classification can be:
i) English-Speaking World: In the English –speaking countries Dewey Decimal Classification
(DDC), Library of Congress Classification (LC), Bliss Bibliographic Classification (BC),
Dickinson Classification are generally followed.
ii) Non English Speaking World: Non English speaking countries use Nippon Decimal
Classification (NDC), Principes de Classement des Documents Musicaux (PCDM), Chinese
Library Classification (CLC), Korean Decimal Classification (KDC), etc.
Synthesis means combining codes from different lists to represent the different attributes
of a work. Based on synthesis library classification may be Bibliographic Classification by Bliss,
Colon Classification by Ranganathan, Expansive Classification by Cutter, Universal Decimal
Classification, etc.
Based on the arrangement there are three main types of classification systems:
i) Enumerative: Produce an alphabetical list of subject headings; assign numbers to each heading
in alphabetical order. The most common classification systems, LC and DDC, are essentially
enumerative, though with some hierarchical and faceted elements, especially at the broadest and
most general level.
ii) Hierarchical: Divides subjects hierarchically, from general to specific.
iii) Faceted or analytico-synthetic: Divides subjects into mutually exclusive orthogonal facets.
The first true faceted system was the Colon classification of S. R. Ranganathan.
iv) Specialist Classification: Specialist classification systems have been developed for particular
subject areas, and some specialist libraries develop their own classification system that
emphasizes those areas they specialize in. An example is the Medical Subject Headings devised
by the US National Library of Medicine (NLM). Another example is the specialist classification
system for art and iconography (Iconclass). There are also emerging metadata standards that are
being developed for web resources, digital images, and other specialized materials.
4. Dewey Decimal Classification: The Dewey Decimal Classification (DDC) system is the
world’s most widely used library classification system. American librarian and library educator
Melville Dewey devised the system in 1873 while he was a student
at Amherst College in Massachusetts. The Dewey Decimal system was first published in 1876 as
“A Classification and Subject Index for Cataloguing and Arranging the Books and Pamphlets of
a Library”. It appeared in the form of a small book of 44 pages. The Decimal Classification
Editorial Policy Committee (EPC) was established in 1937 to serve as an advisory body to the
Dewey Decimal Classification. In 1988, Online Computer Library Center, Inc (OCLC) acquired
the DDC. The editorial headquarters was located at the Library of Congress in the Decimal
Classification Division. The editors prepare the proposed schedule revisions and expansions, and
forward the proposals to EPC for review and recommended action. Nowadays, DDC is
published by Online Computer Library Center, Inc in full and abridged editions. The abridged
edition targets the general libraries having less than 20,000 titles. Both the full and abridged
editions are available in print as well as in electronic version.
4.1 Introduction to 22nd Edition of DDC: The edition 22 is the first edition of the DDC, which
is produced in the context of the web environment. DDC 22 is composed of the following major
parts in four volumes.
a) Volume 1: It includes special features of edition 22, introduction regarding how to use the
DDC, glossary, index to the introduction and glossary, a manual (guide to the use of the DDC),
and six numbered tables. It also has the lists that compare editions 21 and 22 with the list of
relocated, discontinued and reused numbers.
b) Volume 2: It includes DDC summaries (the top three levels of the DDC), and schedules (from
000-599). The summaries will help you to visualize at a glance the structure and scope of
various subjects as laid down in DDC.
The first summary contains ten main classes. The first digit in each three-digit number
represents the main class. For example, 600 represents technology.
The second summary contains the hundred divisions, ten for each main class. The second
digit in each three-digit number indicates the division. For example, 600 is used for general
works on technology, 610 for medicine and health, 620 for engineering, 630 for agriculture.
The third summary contains the thousand sections. The third digit in each three-digit
number indicates the section. Thus, 610 is used for general works on medicine and health, 611
for human anatomy, 612 for human physiology, 613 for personal health and safety.
c) Volume 3: It includes the organization of knowledge schedules from 600-999.
d) Volume 4: It includes a relative index. The relative index (it relates subjects to discipline)
contains an alphabetical list of subjects with the disciplines in which they are treated as sub-
arranged alphabetically under each entry.
4.2 Understanding the Structure of DDC: The Dewey Decimal Classification (DDC) system
uses simple decimal notation to divide recorded knowledge into 10 main classes at the broadest
level which together cover the entire world of knowledge. Each main class is further divided into
ten divisions, and each division into ten sections giving 100 divisions and 1,000 sections. All the
numbers for the divisions and sections have not been used.
a) Tables: The six tables in the DDC are as following
T1 Standard Subdivisions
T2 Geographic Areas, Historical Periods, Persons
T3 Subdivisions for the Arts, for Individual Literatures, for Specific Literary Forms
T4 Subdivisions of Individual Languages and Language Families
T5 Ethnic and National Groups
T6 Languages
The notation from T1can be added to any numbers unless there is an instruction in the
schedules or tables to the contrary. The other table notations may be added only when
instructions are given in the schedules or tables.
b) Summaries: The Dewey Decimal Classification divides human knowledge into ten basic
categories, with subdivisions indicated by decimal notation. Each of the ten main classes has the
potential to be broken down into smaller multiples of ten. The word decimal in the name of the
classification system comes from decem, the Latin word for “ten”.
DDC has three summaries. The first summaries includes 10 main classes, the second
summary includes 100 divisions and the third summary includes 1000 sections.
i) First Summary: The ten primary classes of DDC are as follows:
000 Generalities
100 Philosophy and psychology
200 Religion
300 Social sciences
400 Language
500 Natural sciences and mathematics
600 Technology (applied sciences)
700 The arts; fine and decorative arts
800 Literature and rhetoric
900 Geography and history
A brief explanation of each of the class is given below.
000: Class 000 is the most general class. It includes the works that are not limited to any one
specific discipline or the works that are related to information and knowledge. It includes
encyclopedias, newspapers, general periodicals, computer science, library and information
science, journalism, etc.
100: Class 100 covers Philosophy, Parapsychology and occultism, and Psychology.
200: Class 200 is devoted to Religion.
300: Class 300 covers the social sciences that include Sociology, Anthropology, Statistics,
Political science, Economics, Law, Public administration, Social problems and services,
Education, Commerce, Communications, Transportation, Custom (including folk literature), etc.
400: It comprises languages, linguistics, and specific languages.
500: It includes Natural sciences and Mathematics.
600: Class 600 includes technology.
700: It covers arts in general, fine and decorative arts, music, and the performing arts. It also
includes recreation, including sports and games.
800: It covers literature, and includes rhetoric, prose, poetry, drama, etc.
900: It is devoted to History and Geography.
ii) Second Summary: Again, each of the 10 Main Classes is subdivided into 10 Divisions
resulting in 100 Divisions on the whole. The entire second summary is reproduced bellow for
your reference. You should remember the first and second summary of DDC fully.
000 Computer science, knowledge & systems
010 Bibliographies
020 Library & information sciences
030 Encyclopedias & books of facts
040 [Unassigned]
050 Magazines, journals & serials
060 Associations, organizations & museums
070 News media, journalism & publishing
080 Quotations
090 Manuscripts & rare books
100 Philosophy
110 Metaphysics
120 Epistemology
130 Parapsychology & occultism
140 Philosophical schools of thought
150 Psychology
160 Logic
170 Ethics
180 Ancient, medieval & eastern philosophy
190 Modern western philosophy
200 Religion
210 Philosophy & theory of religion
220 The Bible
230 Christianity & Christian theology
240 Christian practice & observance
250 Christian pastoral practice & religious orders
260 Christian organization, social work & worship
270 History of Christianity
280 Christian denominations
290 Other religions
300 Social sciences, Sociology & Anthropology
310 Statistics
320 Political science
330 Economics
340 Law
350 Public administration & military science
360 Social problems & social services
370 Education
380 Commerce, communications & transportation
390 Customs, etiquette & folklore
400 Language
410 Linguistics
420 English & Old English languages
430 German & related languages
440 French & related languages
450 Italian, Romanian & related languages
460 Spanish & Portuguese languages
470 Latin & Italic languages
480 Classical & modern Greek languages
490 Other languages
500 Science
510 Mathematics
520 Astronomy
530 Physics
540 Chemistry
550 Earth sciences & geology
560 Fossils & prehistoric life
570 Life science; Biology
580 Plants (Botany)
590 Animals (Zoology)
600 Technology
610 Medicine & health
620 Engineering
630 Agriculture
640 Home & family management
650 Management & public relations
660 Chemical engineering
670 Manufacturing
680 Manufacture for specific uses
690 Building & construction
700 Arts
710 Landscaping & area planning
720 Architecture
730 Sculpture, ceramics & metalwork
740 Drawing & decorative arts
750 Painting
760 Graphic arts
770 Photography & computer art
780 Music
790 Sports, games & entertainment
800 Literature, Rhetoric & Criticism
810 American literatures in English
820 English & Old English literatures
830 German & related literature
840 French & related literatures
850 Italian, Romanian & related literatures
860 Spanish & Portuguese literature
870 Latin & Italic literatures
880 Classical & modern Greek literature
890 Other literatures
900 History
910 Geography & travel
920 Biography & geography
930 History of ancient world (to ca. 499)
940 History of Europe
950 History of Asia
960 History of Africa
970 History of North America
980 History of South America
990 History of other areas
iii) Third Summary: In the third summaries, each one of the 100 divisions is further subdivided
into 10 sections resulting in 1000 sections. For the copyright issue, the third summary is not
included here in this unit. But, you can find the complete summaries of DDC 22nd edition over
OCLC website (http://www.oclc.org/dewey/resources/summaries/default.htm), and Chopac.org
(http://chopac.org/cgi-bin/tools/ddc22.pl). The Chopac.org provides the DDC summaries of 22nd
edition in a very easy to browse, and search structure. You can also use this interface to obtain
the main class number of any document.
You can also find the Dewey Decimal Classification System (13th Abridged) in the
website of Near North District School Board (http://www-
lib.nearnorth.edu.on.ca/dewey/ddc.htm).
c) Schedules: Schedules contain the schedules of Class Numbers assigned in numeric order
from 000 to 999. To follow the correct use of the Schedules, it is necessary to understand the
various notes and instructions suggested in different entries. So, let’s explore the schedule in
some details.
Entries in the schedules and tables are composed of DDC number in the left margin, a
heading describing the class that the number represents, and often one or more notes. All entries,
numbers, headings, and notes should be read in the context of hierarchy. The first three digits of
schedule number appears only once, when first used, in the number column. They are repeated at
the top of each page where their subdivisions continue. Subordinate numbers appear in the
number column, beginning with a decimal point. The numbers and notes in parentheses provide
options to standard practice. Numbers in square brackets represent the topics that have been
reallocated or discontinued, or unassigned. Square brackets are also used for standard
subdivision concepts that are represented in another location.
Only a fraction of the potential DDC numbers is included in the schedules. It is often
necessary to build or synthesize a number that is not specifically listed in the schedules. If you
turn the third page of the schedule (Vol 2), you will see that entries start with the notation “000”
at the top of the page and a summary of all divisions and sections below it. In the 5 th page you
will see the first entry that is “001” which stands for knowledge, and below it the numbers and
descriptions and different notes to arrive at the correct class number of a document.
d) Relative Index: The volume 4 contains the Relative Index. It is an alphabetical list of all the
subjects given in the Schedules and Tables. It is called the Relative Index because it brings
together under the name of the subject the various aspects of a subject which are scattered in the
schedules according to the disciplines. This index not only arranges the concepts and their terms
in an alphabetical sequence but also shows the relation between the terms and the contexts in
which the subjects appear in the Schedule. It is a key to the Schedules as well as an independent
approach to classification. In the index, all possible subjects are included under main divisions
and sub-divisions so that the classifier finds it easy to search out the possible subjects under the
alphabetical list of relative index. The numbers that are given for subjects in the index are
readymade numbers, but they are not the same as those of the schedule. The classifier has to
finally decide the number himself.
4.3 Steps for Classifying with DDC: While doing the classification of a document one should
procede to the class number in the following ways
a) Determine the Subject: First, try to determine the subject of the book or document in your
hand. The title often provides a clue to the subject, but it should never be the sole source of
analysis. The subject which the book deals with can be determined by going through the table of
contents, chapter headings, the preface or introduction, and the book jacket or the accompanying
materials.
If a work includes multiple subjects, class it under the subject that is being acted upon
(rule of application). The rule of application takes precedence over any other rule. For instance,
class an analytical work dealing with Shakespeare’ influence on Keats with the subject Keats.
Class a work (book) on two subjects with the subjects receiving fuller treatment. If two subjects
receive equal treatment, class the work with the subject whose number comes first in the DDC
schedules (first-of-two rule). For example, history dealing equally with the United States and
Japan, should be classed under history of Japan, because 952 Japan precedes 973 United States
(even if in the title of the work United States appears first, and it is discussed first in the contents
of the work). Class a work in which three or more subjects are treated equally but are all
subdivisions of a broader subject in the first higher number that includes them all (rule of three).
For instance, a history of Portugal (946.9), Sweden (948.5), and Greece (949.5) is classed with
the history of Europe (940).
b) Determine the Discipline: After determining the subject the classifier should try to
determine the disciplinary focus and, if possible, the approach or form of the work.
If a work is dealing with more than one discipline, interdisciplinary number should be
provided to the work.
If you are not able to determine the subject and the discipline of the book in hand, you
can consult “The Relative Index”. It will help by suggesting the discipline(s) in which a subject
is normally treated.
c) Consult the Schedule: The schedules are the only place where all the information about
coverage and use of the numbers may be found. So, once the subject has been determined and
information on the discipline has been found, the classifier should turn to the schedules. The
summaries, headings and notes within the schedules will provide the necessary guidance to
arrive at the appropriate class number.
In the schedule of DDC, special headings, notes, and entries indicate relationships among
the topics that violate the notational hierarchy. The notes are usually given at the highest level of
application. For example, the scope note at 700 applies to 730 to 736 and to 736.4. So, during
the process of classifying a document the classifier has to turn the pages up and down.
Even if the classifier has used “The Relative Index”, he should still rely on the structure
of the classification schedule to arrive at the proper class number of a work. Even the most
promising Relative Index citations must be verified in the schedules.
d) Close and Broad Classification: Close classification means that the content of a work is
specified by notation to the fullest extent possible. Broad classification means that the work is
placed in a broad class by the use of notation that has been logically abridged. For example, a
work on French cooking is classed closely at 641.5944 (641.59 Cooking by place + 44 France
from the T1), or broadly at 641.5 (Cooking). The DDC provides the basic options of close versus
broad classification. A library should choose between these two option based on the size of its
collection and the needs of its users. The abridged edition of the DDC is another source for
broad classification.
e) Other Points: It should be noted that DDC uses the convention that no number should have
fewer than three digits; zeros are used to fill in the numbers. A decimal point (or dot) follows the
third digit in a class number, after which division by ten continues to the specific degree of
classification needed. The “dot” is not used as a decimal point in the mathematical sense; it used
to ease the transcription and copying of the class numbers.
A number should never end in a zero anywhere to the right of the decimal point. Again,
subdivisions beginning with zero should be avoided if there is a choice between zero and 1-9 at
the same point in the hierarchy of the notation (rule of zero).
4.4 Examples of Classifying a Document with DDC Summaries: Now let’s try to classify
some general books practically, wherein we do not require to use seven tables and the details
about the Schedules. For classification of such books, the three summaries of DDC and the
Relative Index will be enough. Now, for example, take a book whose name is “A Text Book of
Geometry”
Here, in the title, it is very easy and expressive enough to determine the subject.
Geometry is the branch of Mathematics and it will come under science. So, go to the first
summary wherein you will find “500 Science”, then consult the second summary, wherein under
500 you will find “510 Mathematics”. Now, in the third summary under “510 Mathematics”, you
will find “516 Geometry”. Now, consult the schedule for verification. In the schedule also the
516 is for Geometry. So, the class number of the above book will be “516”.
Now, suppose, in lieu of the above approach you want to move from the Relative Index.
In such cases, find the word Geometry in the page number 331 of volume 4. Opposite to the
word you will find the number “516” in the following format.
Geometry 516
famous problems 516.204
Now consult the schedule for verification. In page number 515 of volume 2, you will find
“516 Geometry”, so the class number of the above book will be “516”.
4.5 Classification of Document by Using the Web: The cost of DDC is very high. Every
library in India and in other developing countries cannot afford to have a set of DDC as its own.
But the classification of the documents in a library is a must. To meet this end, librarians can use
some tools and techniques to have a class number of a document they have procured in their
library. There are some excellent tools over the web that share the class numbers. Some of these
tools and techniques are discussed bellow. They will provide the readymade class number of a
document and will save the time of the classifier. We may not require to follow these options if
we have a set of DDC. We are to only follow the options listed below in the event of not having
a set of DDC. We can also follow these options to verify the class number obtained by
consulting the DDC on our own.
a) Classify: An Experimental Classification Web Service: OCLC Research experimental
classification service launched “Classify” (http://classify.oclc.org/classify2/) which is targeted to
support the assignment of class number and subject heading by using the web. The interface can
be used both by a machine as well as human being. It provides access to more than 36 million
collectively built records from a large pool of related resources. Each record in the database
contains Dewey Decimal Classification (DDC) numbers, Library of Congress Classification
(LCC) numbers, or National Library of Medicine (NLM) Classification numbers, and subject
headings from the Faceted Application of Subject Terminology (FAST).
In the database of Classify (http://classify.oclc.org/classify2/) by inputting any one or in
combination of some basic information related to the document, the class number or subject
heading can be obtained. The inputted information may be of the following types-
i) ISBN: You can use the 10 or 13 digit ISBN. The ISBN should be used without hyphens in
between. You can find more about ISBN over: http://www.isbn-international.org/
ii) OCLC #: Each bibliographic record in the WorldCat has a unique number that range from 1 to
9 digits in length. You can also use this number to find out the information from the database.
More about OCLC # is available over: http://www.worldcat.org/links/default.jsp
iii) Barcode / The Universal Product Code (UPC): You can use the 12 digits UPC number
found in the document. You can know more about Barcode over: http://www.gs1us.org/
iv) International Standard Serial Number (ISSN): You can use the eight digits ISSN with or
without hyphen (as it is appeared in the document). You can know more about ISSN over:
http://www.issn.org
v) Title and / or Author: You can also use full title of the document or some portion of it or its
author or both the title and the author as a combined search.
vi) Faceted Application of Subject Terminology (FAST): You can also use the FAST controlled
vocabulary that is based on the Library of Congress Subject Headings (LCSH). You can collect
more information about FAST over: http://www.oclc.org/research/activities/fast/
If you go to (http://classify.oclc.org/) web address and enter the ISBN / ISSN or any
standard number correctly in the interface it sometimes shows a “No data found for the input
argument” error. But, if you use the title and some portion of the authors’ name of the same
document it shows the result. It happens probably because sometimes people perhaps do not
entered those fields in the records of the database, while preparing it.
Entering some portion of the title and the first author’s surname (or sometimes the
forename) of the document in the interface mostly leads to the relevant document and class
number. You can use this option as your first approach to obtain the class number of the
document or its subject heading.
Fig. 1 : Home Page of Classify of OCLC
b) DeweyBrowser: The DeweyBrowser (http://deweybrowser.oclc.org) provides access to
approximately 2.5 million records from the OCLC Worldcat database. You can also use this
interface to obtain readymade class number of a document in your library. Just make a search by
entering the complete title of the document in the search box of the site to have its class number.
Exercise
The WebDewey also offers easy-to-use, World Wide Web-based access to the Dewey
Decimal Classification (DDC) and related information, with searching and browsing
capabilities. One can also find Library of Congress Subject Headings (LCSH) intellectually and
statistically mapped to Dewey numbers; and links from the mapped LCSH to the corresponding
LCSH authority records. It is also an excellent tool for online classification of the document, but
the bad thing is that it is a paid service. It costs from $ 225-$575 per year.
4.6 Let Us Sum Up: In this unit you have learnt how to classify a document by using the DDC
summaries as well as by using different online tools and techniques. Sometimes a book itself
may contain the classification number. In such cases, you can simply copy down that
classification number from Cataloguing in Publication (CIP) data. The CIP will provide
classification number, subject headings, and notes. This type of data is very common in the verso
of the title page of many books published from U.S., Australia, British, and Canada. So, if you
have a book published from the above countries, try to find the CIP data and copy it to your
document.
The unit takes into account the Dewey Decimal Classification (DDC) that includes the
structure of the DDC consisting of Tables, Summaries, Schedules and Relative Index.
Classification of document by using the web is another important point of discussion in the unit.
In this section the relevant matter includes “Classify”, Dewey Browser, ISBNdb.com and
Library of Congress Online Catalogue. Each of these concepts has been exercised to give an idea
about the use of the web for classification.
5. Library of Congress Classification: In 1898 a group under the guidance of J. C. M. Hanson,
the head of the catalog division at the Library of Congress in Washington, D.C, and Charles
Martel, the library’s chief classifier, developed the first part of the Library of Congress (LC)
Classification system. In the years that followed, numerous specialists contributed to the further
development of the system and expanded it to cover other subject areas.
The Library of Congress Classification system divides human knowledge into 21 major
classes, using letters of the English alphabet for each, with further subdivisions indicated by
decimal notation. The system does not use the letters I, O, W, X, and Y.
The major classes of the Library of Congress Classification system are as follows:
A General works
B Philosophy; psychology; religion
C Auxiliary sciences of history
D History: General and Old World
E-F History: America
G Geography; anthropology; recreation
H Social sciences
J Political science
K Law
L Education
M Music and books on music
N Fine arts
P Languages and literature
Q Science
R Medicine
S Agriculture
T Technology
U Military science
V Naval science
Z Library science
6. Universal Decimal Classification: UDC, which was designed to facilitate the organization of
a universal bibliography of all recorded knowledge, first made its origin at Belgium in 1895 by
bibliographers Paul Otlet and Henri La Fontaine. Initially UDC was based on the fifth edition of
the Dewey Decimal Classification that combines notation to express multiple concepts. The
Universal Decimal Classification system is issued by the International Federation for
Documentation, in the Hague, Netherlands, which is responsible for its ongoing revision.
7. Colon Classification: In 1933 Indian librarian Shiyali Ramamrita Ranganathan introduced
the Colon Classification system, which classifies all knowledge into broad, fundamental
concepts. The Colon system then divides these concepts into several distinguishing
characteristics, which Ranganathan called facets. The classification system uses colons (:) to
distinguish between the various facets in a single notation and the name “Colon Classification
system” is derived from its use in its notation scheme.
In United States, most research and academic libraries use Library of Congress
Classification, while most schools and public libraries use Dewey Decimal Classification. The
UDC system is widely used in Europe, Latin America, Russia, and Japan. Although the use of
the Colon Classification system is limited to a few Indian libraries, Ranganathan’s concept of
facet analysis in classifying knowledge has been widely recognized. Some of its key concepts
have been adopted by subsequent editions of the DDC or UDC, among others.
Terms
Terms
1. Definition: In order to provide access to the holdings of a library, an index or list of the
materials is always prepared and maintained systematically for the readers. It contains all the
essential details about the documents with location mark, usually in numerical form, by which
the documents can be located on the shelves of the library. This list or index or tool is basically
called a library catalogue.
Cataloguing meant those activities that record, describe and index the resources of a
collection that were acquired in a manner that will aid the end-user in locating materials in the
collection(s). Library items that are written in a foreign script are, in some cases, transliterated to
the script of the catalog.
Ranganathan has defined a library catalogue as “a list of document in a library or in a
collection forming a portion of it”. A “list” refers to some kind of arrangement based on a set
plan and a “document” constitutes embodied thought, which is a ‘record of work on paper or
other material fit for physical handling, transport across space and preservation through time’.
This means that document includes all types of records in which information can be stored or
presented.
According to Ruth French Strout, a catalogue may be considered “a work in which
contents are arranged in a reasonable way, according to a set plan or merely word by word”.
2. Need and Purpose: The objective or function of the early catalogue was to serve as an
inventory list with progressive pattern of arrangement based on the order of accession
chronologically by date of publication or period of author. From this arose a wide variety of
approaches and an expansion of the inventory idea to include retrieval.
The modern library catalogue serves both the inventory (listing) and retrieval (finding)
function. Without cataloguing, it would be difficult for anyone to know what is in the collection,
how many items dealing with a particular topic are in the collection and so on. What one sees in
the public catalogue is the result of the efforts of the cataloguing staff and the extent of the use of
library resources depends greatly upon the quality of it. A well made catalogue definitely adds to
the reputation of the library. Library cataloguing allows library aids to assist the end-users in
locating the materials. The need and purpose of the library catalogue can be viewed from the
following points of view
a) General Objectives: The general objectives of library catalogues are-
i) Register: At any time the user may not find the entire collection of the library on the shelf.
Therefore, to know about the entire collection (what is available) at any time reliance is to be
given to some other dependable tool. Catalogue, which is a register of all informational items
found in a particular library or group of libraries serves this end.
ii) Finding Aid: Cataloguing helps the user in locating the document in the stack. Simply it
guides the user to the exact location of a stack in which he / she will find the book of his/her
interest.
iii) Describes an Entity: Catalogue is only one of the many forms of bibliography, giving
essential general information about an informational entity (e.g., books, computer files, graphics,
regalia, cartographic materials, a webpage etc.).
iv) Satisfies Different Approaches: Cataloguing satisfies different kinds of approaches of the
patron of the library, say author, title, series, subject approach etc.
b) Charles Ammi Cutter Objectives: Charles Ammi Cutter made the first explicit statement
regarding the objectives of a bibliographic system in 1876. These have been frequently quoted
and criticized. According to Cutter, those objectives are
a) To enable a person to find a book of which (Finding objective) one of the following is known
i) The author
ii) The title
iii) The subject.
b) To show what the library has (collocating objective)
i) By a given author
ii) On a given subject
iii) In a given kind of literature
c) To assist in the choice of a book (Choice objective)
i) As to its edition (bibliographically)
ii) As to its character (literary or topical)
It is only a few readers who are able to express their subject requirements in specific
terms. They think of either a narrower or broader subject rather than the specific subject they
require. Considering this, Ranganathan raised an important point by quoting “if it is the interest
in the subject which takes him to the library, his wants will be better served if the catalogue can
spread before him a full connected panorama of all materials on his specific subject, all its
subdivisions and all broader subject of which it is itself a subdivision”. Ranganathan in the light
of the five laws of library & information science expressed the objectives of a catalogue as the
following
A catalogue should be so designed as to
i) Disclose to every reader his or her document;
ii) Secure for every document its reader;
iii) Save the time of the reader and with this save the time of the staff.
The Cutter objectives are more specific in comparison to the Ranganathan approach in
describing the objectives of a library catalogue.
c) Paris Conference: The principles adopted by the International Conference on Cataloguing
Principles held in Paris in 1961 are considered a landmark that leads to the standardization of
practices. The Paris conference resolved the function of a catalogue as given below
The catalogue should be efficient instrument for ascertaining
a) Whether the library contains a particular book specified by
i) Its author and title or
ii) If the author is not named in the book its title alone or
iii) If author and title are inappropriate or insufficient for identification, a substitute for the title
and
b) i) Which work by a particular author and
ii) Which edition of a particular work in the library.
The function as adopted by the Paris conference is more or less a restatement of the
Cutter objectives as described in his first edition of 1876.
d) Simonton Objectives: According to Simonton (1964) a library catalogue serves three
purposes in the conventional library and especially in the research library.
i) Describing all items catalogued to a degree of precision permitting positive identification.
ii) Establishing and describing the relationship of all items catalogued in terms of community of
authorship or sponsorship, similarly of context and continuity of bibliographic history.
iii) Serving as a finding list.
Though the objectives stated by Cutter have been criticized a great deal and quoted very
often, these can only explain the explicit objective of a catalogue. These have stood the test of
time and according to Patrick Quigg “later statements’ are most usually restatements of them”.
3. Different Kinds of Catalogue: The catalogue may be of different types based on different
approaches to division.
Based on physical form of presentation library catalogue can be of the following types
i) Printed Catalogue: The printed catalogue is also known as dictionary catalogues or bound
book catalogue. This type of catalogue is just like a book where individual catalogues are printed
to make it easy to consult for the user. The printed catalogues sometimes are interlaced with
blank leaves on which additions could be recorded. This type of catalogue is difficult to produce
and update; it’s very difficult to interpolate new entries and maintain correct sequence in it.
Again, its portability can be a disadvantage to other users because when a single volume is taken
to nearby table to be used by a particular user, it becomes difficult for the other user to consult
and there is no guarantee that the user will keep the volume in the proper place.
The British Museum catalogue of printed books is an example of this kind of catalogue.
ii) Guard Book Catalogue: This type of catalogue is also known as paste down catalogue. In
paste down catalogue, the base is a bound volume of thick blank sheets; each typed or printed
entry is pasted in the correct sequence on the successive right hand pages, leaving space for at
least five more entries to be inserted between any two consecutive pages. The left hand page is
left blank for pasting down any new entry not finding its due place vacant on the right hand
page, in the corresponding position. In case a given portion of the catalogue becomes too
crowded, the stripes are lifted and redistributed. This is similar to a printed catalogue except that
additional new entries can be pasted in and also new pages can be inserted. It is sometimes used
in conjunction with a printed catalogue and used prior to its production, bringing a new edition
or in producing a supplement for making addition, deletion, amendment and so on.
iii) Sheaf Catalogue: This type of catalogue is also known as loose leaf book form catalogue. It
contains about six entries on a single paper slip with holes or slots at one edge so that they can
be fastened into binders. Each binder has a locking / releasing mechanism to allow the insertion
of new entries when required yet ensures that the slips remain securely in place when the
catalogue is consulted. Owing to the fact that more than one entry was included on a single leaf
sometimes a break-down in sequence occurs.
iv) Card Catalogue: In card catalogue the size of leaf is reduced so that each leaf containes one
entry only and as the small leaf is inconvenient to handle so it has been replaced by the card.
Each card is of 125 mm X 75 mm. The cards are arranged in trays and held in their relative
position by a rod passing through holes near their bottom edge. The trays are all built into a
cabinet. The specification for the catalogue cabinet is given by the Indian Standards Institution.
The card catalogues allow much more flexibility.
v) Online Public Access Catalog (OPAC): The card catalogue was a familiar sight to library
users for generations, but the computerization of library activities has led to rethinking regarding
the form, purpose and function of a library catalogue. Now the card catalogue has been
effectively replaced by the OPAC or Web OPAC. Some libraries with OPAC access still have
card catalogues on site, but these are now strictly a secondary resource and are seldom updated.
Some libraries have eliminated their card catalogue in favour of the OPAC. The other form of
catalogue can be easily obtained as an output from OPAC.
Based on source where cataloguing is done catalogue can be grouped into the following
types-
i) Individual Cataloguing: Cataloguing done by individual libraries, institution, people to serve
their own need and purpose or for their own sake are known as individual cataloguing.
ii) Cooperative Cataloguing: Cooperative cataloguing refers to a situation where a number of
independent libraries share the work of producing a catalogue for their mutual benefit. It is done
in two or more libraries for the benefit of each participant and the results may or may not be
made available to other libraries. One of the important outputs of cooperative cataloguing is
Union catalogue.
iii) Centralized Cataloguing: Centralized cataloguing is defined as the cataloguing of documents
by some central organization for the benefit of other libraries. This form of cataloguing can take
place within one library system or within a number of library systems. Sometimes centralized
cataloguing may be done by another agency. Some of the forms of centralized cataloguing
services are Card or shelf service, Cataloguing in source, Cataloguing in publication, and
Prenatal cataloguing.
The term “Prenatal cataloguing” was used by Dr. S.R. Ranganathan. In this process the
cataloguing work has been done by the National Central Library of a country on each book
before its release by the publisher. This is done with the help of a copy of the form proof of each
book sent by each publisher. The National Central Library prepares a muster stencil of the
catalogue cards for each book before its release. The catalogue cards are later made available for
distribution to libraries on order along with the release of books themselves, Call numbers are
also printed on the back of the title pages and tooled on the binding as well. According to
Ranganathan, this type of process leads to saving 79% in the technical manpower of an intra
National and inter National Library System.
Based on the type of entry catalogue can be divided into the following-
i) Author Catalogue: A formal catalogue, sorted alphabetically according to the authors' or
editors' names of the entries.
ii) Title Catalogue: A formal catalogue, sorted alphabetically according to the title of the entries.
iii) Keyword Catalogue: It is a subject catalogue, sorted alphabetically according to keywords.
The keywords are derived by using some system.
iv) Mixed Alphabetic Catalogue: It is a mixture of author / title, or an author / title / keyword
catalogue.
v) Systematic Catalogue: A subject catalogue, sorted according to some systematic subdivision
of subjects is called systematic catalogue.
vi) Shelf List Catalogue: It is a formal catalogue with entries sorted in the same order as
bibliographic items are shelved on the stack.
d) Based on Scope: Based on the scope of a catalogue unit, cataloguing can be divided into i)
Individual catalogue and ii) Union catalogue. When a library catalogue lists holding or part of
holding of two or more libraries then it is called a union catalogue.
e) Based on Purpose: Based on purpose catalogue can be classified as Library Catalogue, Book
Sellers Catalogue, Publisher Catalogue, Dealers Catalogue, etc.
4. Criteria for Selection of Library Catalogue: In selecting the forms of catalogue to be
adopted by the librarian, he / she may consider the following factors-
i) Economic to produce and handle: The production and its subsequent maintenance cost and
labour of the catalogue should be minimal.
ii) Compact in size: It should not occupy much space in the library.
iii) Bring together like entries: It should have the provision to bring together entries with the
same heading or leading section.
iv) Updating: The selected catalogue should have the provision to insert or withdraw entries
easily as and when required.
v) Reproduction: It should have the provision to produce duplicate copies.
vi) Durability: The catalogue should be durable.
vii) Accessible: It should be reasonably accessible (within approach) to both users and staff
members of the library.
viii) Easy to handle and consult: To enable a user to find entries with ease. It should be easy to
handle and consult.
ix) Speed of searching: It should be amenable to fast speed of search.
x) Portability: It should be easily portable to enable the user / staff to consult it from inside or
from outside the library. The user should be able to take it home and consult it there.
5. Cataloguing Rules: Cataloguing rules have been defined to allow for consistent cataloguing
of various library materials across several persons of a cataloguing team and across time and
space. Users can use them to clarify as to how to find an entry and how to interpret the data in an
entry.
Cataloguing rules prescribe which information from a bibliographic item is included in
the entry; how this information is presented on a catalogue card or in a cataloguing record; how
the entries should be sorted in the catalogue. Currently, most cataloguing rules are similar to, or
even based on, the International Standard Bibliographic Description (ISBD), a set of rules
produced by the International Federation of Library Associations (IFLA) to describe a wide
range of library materials. These rules describe an item in terms of: title and statement of
responsibility (author or editor), edition, material-dependent information (for example, the scale
of a map), publication and distribution, physical description (for example, number of pages),
series, note, and standard number (ISBN).
A catalogue code is a set of rules for the guidance of cataloguers in preparing entries for
catalogues so as to ensure uniformity in treatment. These codes may also include rules for
subject heading, filling and arranging of entries. Classified catalogue code by S. R. Ranganathan
and Anglo-American Cataloguing Rules, 2nd edition (AACR-II) are examples of such catalogue
codes. In June, 2010, the Resource Description and Access (RDA) was published, which will
completely take over the place of AACR-II. AACR-II was the most commonly used set of
cataloguing rules in the English speaking world. The AACR-II has been translated into many
languages for use around the world. AACR-II provides rules for descriptive cataloguing only
and does not touch upon subject cataloguing.
5.1 Anglo-American Cataloguing Rules – II: AACR-II was jointly prepared by American
Library Association, The British Library, The Canadian Committee on Cataloguing, The Library
Association, UK, and The Library of Congress. The code was edited by Michael Gorman and
Paul W. Winkler. It was published in 1978 by the American Library Association and Canadian
Library Association.
There are two parts and four appendices in AACR-II. An index was also provided at the
end of the code and it has been compiled by KG B Backwell.
Part I: Description
1. General Rules for Description
2. Books, Pamphlets and Printed Sheets
3. Cartographic Materials
4. Manuscripts
5. Music
6. Sound Recordings
7. Motion Pictures and Video Recordings
8. Graphic Materials
9. Machine-Readable Data Files
10. Three-Dimensional Artifacts and Realia
11. Microforms
12. Serials
13. Analysis
Part II: Headings, Uniform Titles and References
14. Choice of Access Points
15. Headings for Persons
16. Geographic Names
17. Headings for Corporate Bodies
18. References
Appendix A: Contains instructions for Capitalization
Appendix B: Contains list of Standard Abbreviations
Appendix C: Deals with Numerals
Appendix D: Glossary
AACR-II prescribes three levels of details in the description depending upon the nature
and the size of the library. The first level provides a brief cataloguing description just to identify
a particular document. It is recommended for a small library. The second level description is
recommended for a medium size library, whereas the third level of description includes all the
elements prescribed in the AACR-II and is recommended for the highly specialized libraries or
national and research libraries. Here, we will concentrate only on the second level of description.
5.2 Card Catalogue: In most of the libraries of India the entries are written on card. The
standard size of the card is 12.5 X 7.5 cm or 5’’X 3". The catalogue cards which are used for
preparing entries may be ruled, semi-ruled or plain. The ruled cards are very convenient if the
entries are prepared by hand, and if the matter is typed then plain cards are more suitable and
used. There are different lines on the card, which may be of the following types:
First Indention: It is the first vertical line that lays nine (9) spaces from left margin. This line is
in red ink.
Second Indention: It is the second vertical line that lays thirteen (13) spaces from left margin or
four letters space from first indention. It is also indicated in red ink.
Third Indention: Beyond the second vertical line there is also a third indention which is an
imaginary line. It lays fifteen (15) spaces from left margin. In a reference, referred-from heading
continues from third indention.
Horizontal Line: The card has also one horizontal line in the upper section of the catalogue
card. It is a bold line and is also indicated in red ink.
Hole: The card also contains one hole at the bottom portion at equal distance from both the
vertical cores of the cards. A rod of iron or brass is used to support all the cards in the tray
through this hole.
5.3 Types of Entries: Each library prepares various unit records for each document in its
holding. These unit records are prepared to meet the various need and approach of the library
user to the document. These unit records are called as entries.
AACR-I regards the main entry as “the complete catalogue record of a bibliographical
entry, presented in the form by which the entity is to be uniformly identified and cited. The main
entry normally includes the tracing of all other headings under which the record is to be
represented in the catalogue”.
An added entry is “an entry, additional to the main entry, by which an item is represented
in a catalog” (AACR-II, p. 563). The additional entries supplement the main entry by providing
an additional approach to the documents listed in the catalogue.
a) Type of Information Needed for Cataloguing: The cataloguer needs the following
information about a document for cataloguing.
Name of the authors
Name of the collaborators
Title, subtitle or alternative title of the document
Edition
Name of the series
Editor of series
Name, place and year of publication
Size and number of pages of the document
Copyright year
ISBN/ISSN
The call number (class number and book number) of the document. It can be found at the
verso of the title page that will be provided by the classifier.
The accession number of the document. It also can be found at the verso of the title page.
The accessionist will provide this number.
b) Sources of Information Needed for Cataloguing: The prescribed source of information for
the preparation of the card catalogue is the title page. It provides most of the information about
the book. It is the next printed page to the cover of the book. Please note here that the cover page
of the book is not the title page. The page leaving one or two pages from the beginning and on
which the description mentioned bellow is printed is called the title page. The title page, in upper
most part of it, contains the title and subtitle (if any) of the book. The names of authors and
collaborators with their working institutions are given in the middle of the page. In the lower
part, the name of the publisher, place and year of publication and price etc are given. If there is
no title page, one can consult the cover caption or the half title page of the book. In the half title
page of the book, only the title of the book, but no author and publication statements, is printed.
Sometimes, the name of the series is also printed on this page. The verso / back of the title page
contains copyright year, print and reprint, edition, name and address of the publisher, the price,
and so on.
Besides the title page, we can also collect information about the book (in order of the
following preference)
i) Accompanying material
ii) A container
iii) Another published description of the book or
iv) Any other available sources.
AACR-II recommends the following types of entries
i) Main Entry: The Main entry is an author entry in AACR-II. If the authorship is diffused or
not known the main entry is prepared under the title. The Main Entry is the complete catalogue
record of an item. It also includes the tracing of all other headings under which the record is to
be presented in the catalogue.
ii) Added Entry: An added entry is a secondary entry, additional to the Main Entry, by which an
item is represented in a catalogue. S R Ranganathan calls it “entry other than the main entry”.
There are different types of added entries. i.e. Joint author(s), Editor(s), Translator(s),
Compiler(s), Subject, Title, Series, etc. The number and kind of added entries required by a
document depends upon the nature of a particular document and also on the nature of the
catalogue used in a library.
iii) Reference: Reference is a direction from one heading or entry to another. There are different
types of references in AACR-II. They are See Reference, See also Reference, Name title
Reference, Explanatory Reference, etc. Out of all the references “See” and “See also” type of
references are frequently used.
* See Reference: It directs the user of a catalogue from a form of the name of a person or a
corporate body or the title of a work to the form that has been chosen as a name heading or a
uniform title.
Examples:
Md. Syed Ahmed Khan
see Syed Ahmed Khan
Dhanpat Rai
see Prem Chand
* “See Also” Reference: The function of a “See also” reference is to direct the user from one
name heading or uniform title to another that is related to it. If the works of one person or
corporate body are entered under two different headings a “see also” reference is prepared from
each heading.
Example:
Home Science
See also Interior decoration
5.4 Rules for Description of Monograph: The elements to be included in the catalogue entry
are divided into the following areas:
a) Call Number: Call number is the combination of class number and book number. It is the
first item which should be recorded in the upper left hand corner of the catalogue card with
pencil.
b) Accession Number: It should be recorded on the seventh line from the top of the card or
fourth line from the bottom.
c) Author: “Author” in the entry is indicated by writing the surname first which is followed by a
comma “,” and the remaining parts of the name (i.e. forenames) are given after leaving one
space which is followed by the date of birth and / or death of an author in full, if any, and a full
stop. This is written from the first indention and continued from the third indention on the next
line.
d) Title and Statement of Responsibility: The title proper should be recorded exactly as the
wording, order and spelling as it is found in the title page of the document. Capitalization and
punctuation should be avoided.
i) Alternate Title: Use the first part of the title with commas, and then the alternate title.
Examples:
Another world watching, or The riddle of the flying saucers
Indian song of songs, or Gita govinda
ii) Abridge Title: Abridge a long title proper only if this can be done without any loss of the
essential information. Indicate the omission by the mark of three dots “…”.
iii) Initial and Acronyms: If a title proper includes separate letters or initials without full stops
between them, record such letters without spaces between them. If such letters or initials have
full stop between them, record them with full stops.
Example:
“ALA Rules for filling catalog cards” and “A.L.A. Rules for filling catalog cards”
iv) Parallel Title: Record parallel title in the order indicated by their sequences. If the title
appears in two or more languages, choose one of these as the title proper and record the other
titles as parallel title. The parallel title appearing outside the chief source of information should
be noted in the note section of the catalogue card.
v) Title in Numerals: If the title of a document appears in numerals, record it in letters and
endorse it in the square brackets.
Example:
“20 [Twenty] – point programme”.
vi) Other Title Information: Record other title information (subtitle, etc) appearing in the chief
source of information. Use space colon space “ : “ between the title proper and other title
information.
Example:
“Cataloguing : theory and practice”.
e) Statement of Responsibility: Record statement of responsibility in the form in which they
appear in the chief source of information. The statement of responsibility should be preceded by
a diagonal slash. If there is more than one statement of responsibility, record them in the order
indicated by their sequence on or by the layout of the chief source of information. If the
statement of responsibility is taken from outside enclose it in square brackets.
Example:
“Cataloguing practice / by S R Ranganathan”.
f) Edition: This area should be preceded by a full stop, space dash space “. – “. The statement of
responsibility should be preceded by a diagonal slash, and then each subsequent statement of
responsibility should be preceded by a semi-colon. The standard abbreviations and numerals in
place of words should be used.
Example:
“2nd ed”, “3rd ed”, “New ed”, “Rev ed”, “Rev and enl ed”.
g) Place: If a publisher has many offices in more than one place, always prefer the name of the
first place and omit all other places. If the place of publication, distribution, etc is uncertain, give
the probable place with a question mark in square brackets.
Example:
“[Delhi?]”.
If, no place or probable place can be given, put the abbreviation sl (Sine loco) in square
brackets “[s.l.]”. “Sine loco” means “no place” in Latin.
Example:
“[s.l.]: Vikas, 2001”.
h) Publisher: After the place of publication, use the shortest form of the publisher in which it
can be understood and identified internationally. If the book has two or more publishers, record
the first named place and publisher. If the name of the publisher is not known, the abbreviation
sn (sine nominee) is given in square brackets. Example: “[s.n.]”.
i) Date of Publication: Give the year of publication in Arabic numerals preceded by a comma.
Example:
“, 2001”.
If there is no date, the copyright date is given.
Example:
“, c 1999”.
If the date of publication is not known then n.d. (no date) is written in square brackets.
Example:
[n.d.].
j) Physical Description Area: This paragraph starts from the second indention and continues
from the first indention. This area consists of pagination, illustrative matter and size of the
document expressed in cm.
If the volume is without pagination, ascertain the total number of pages and give the
number in square brackets. The sequence of describing page information is
“Preliminary pages, Roman pages, Arabic pages.”.
Example:
“xii, 786 p.”.
When preliminary pages are not numbered it should be in the form of : “[xii], 786 p.”.
The connecting symbol between pagination and illustrative matter is a colon “:”. The
illustrated printed monograph is described as “Charts”, “Maps”, “Music”, “Plans”, “Portraits”,
“Samples”, or simple as “ill”.
Example:
“786 p. ; ill.”.
The connecting symbol between the illustrative matter and the height of the document is
semi colon “;”. The height of the document is written in cm.
Example
“786 p. : ill.; 18 cm.”.
k) Series: The series are preceded by a full stop space dash space “. - “. Series statement is
recorded in circular brackets. The series statement may consist of name of the series, statement
of responsibility relating to series and number of series.
Example:
“. - (Ranganathan series in Library Science; 4)”, “. - (Research monographs / Institute of
Economic Affairs; 3)”.
l) Notes: Notes may be given to explain the nature, scope or artistic form of the item, language
of the item, sources of the title proper, variation in title, accompanying material, contents, etc.
m) Standard Number: If the item contains ISBN / ISSN, record International Standard Book
Number (ISBN) or International Standard Serial Number (ISSN) for the item. Example: “ISBN :
0-910608-70-9”.
n) Tracing: Tracing is the record of the heading under which an item is represented in the
catalogue. The information about the added entries should be recorded in a paragraph starting
from the second indention.
Before going for tracing, the subjects of the document need to be determined. In the main
card, the added entries for subject should be numbered in Arabic numerals (Example “1”, “2”)
whereas, the other entries should be numbered in Roman numerals (Example “I”, “II”). Another
point to be noted is that, in the added entries for subject, the names of the subject are written in
all capital letters. Example: “LIBRARY SCIENCE”.
Access point It provides multiple access to the Access is only through entry
database and helpful for Boolean point and a build in cross
searches reference structure.
Indexing techniques Support both pre-coordinate and post Support only pre coordinate
coordinate searching. searching.
User Friendliness It is more user friendly and guides the The user has to decide himself
user in a step by step manner to find the how to find the required card.
information.
Current Status OPAC provides the current status of the It does not provide current
item being search i.e whether a status of the document.
document is on the shelves, on loan, on
reservation or at binders or the
document is lost.
Enhance Feature OPAC provides acquisition of titles, to Such types of facilities are not
reserve material and to send found in a card catalogue
personalized SDI, overdue/ recall /
collect notices and messages by Email.
Union Catalogue Helps to develop centralized database It is very difficult to achieve
and resource sharing among different resources sharing through card
libraries. catalogue
f) OPAC vs Information Retrieval System: The difference between OPAC and Information
Retrieval System are -
Characteristic OPAC Information Retrieval System
Let Us Sum Up: The professional associations address issues like financial support for libraries,
censorship, and cooperative acquisition of library materials. They also attempt to influence
legislation that affect libraries, establishes policies and standards relating to libraries and
librarians, and support continuing education for librarians. Almost all of these organizations
publish journals or monographs relating to their particular areas of interest. Professional library
associations hold conferences on a regular basis so that librarians may come together in order to
develop policies and share ideas.
Private foundations also promote increased and improved library services around the
world. Private philanthropic organizations also provide leadership in the establishment and
maintenance of libraries around the world. In the early 20th century the Carnegie Corporation of
New York was instrumental in establishing free public libraries in Africa, Latin America, and the
South Pacific, but the organization stopped this programme in 1917. Today the Ford Foundation,
based in New York City, provides vital financial support for libraries in the developing nations of
Africa, Asia, and Latin America.
Library as a Social Institution
Library as a Social Institution: In modern societies all activities of the people are organized
through institutions. So, social institution is a product of the society. It is created to work as a
medium for expressing its social processes and it carries them out through its techniques
developed for the purpose. It is a form of social order.
Lowell Martin states: “A social institution is an integrated pattern of human relationship
established by the common will and serving some vital human need.” This definition indicates
that social institution deals with the integrated pattern of human being in the society. Their
pattern is caused through the interaction among the people as a vital social need. For example,
religious institution looks after the belief and unity, educational institution like school, college,
and universities promote knowledge, skill and socialization processes of the society. These
institutions incorporate a body of formal or informal rules and regulations through which
activities of a society are carried out or regulated.
1. Need of Library as Social Institution: We are living in an information age in which
information plays an important role in the complex, economic, political and social environment.
Information plays a crucial role in keeping the citizens well informed so that they can exercise
their right as citizens of a democracy properly. It is the information which allows us to change
and improve the society. Decision makers always seek information. Modern executives, farmers
in the field, workers in the factory and others need information while launching a new product,
plugging the field or building a skyscraper about the state of resources and knowledge about the
uncertain future events that may have to face. The researcher, the teacher, the student, the
administrator, the industrial and business managers, the entrepreneur, the farmers, the workers in
a factory etc all need information to equip themselves better for the fruitful pursuit of their
respective vocation.
In a modern society, every human activity is organized through institution. The society
also needs the institution to look after the above matters. The said institution in the broadest and
most practical sense should be a force for social betterment. No one can imagine other social
institutions except the library that can be entrusted with such type of responsibilities.
Libraries and other similar type of institutions collect, process, organize and disseminate
information and knowledge recorded in document. Since knowledge and information are vital for
all round development of human beings, libraries and other institutions that handle and manage
information and knowledge are indeed invaluable for the welfare of the society.
The libraries acquire, organize, offer for use, and preserve the reading material
irrespective of the form in which it is packaged (print, CD-ROM/DVD, Web form) in such a way
that, when it is needed, it can be retrieved and put into use. No other institution carries out such
long-term, systematic work.
a) It Represents the Society: The study of libraries as an institution provides us an approach to
analyze the past of a society. Its growth is not an isolated instance of society. It originated and
grew out of the necessities of life and in response to the society’s needs i.e. library grows with
the society. The location, the population served, the demand made upon the library, the nature of
collection, financial support, status of librarian, attitude of authorities towards the library, all
over a period of time reflects the growth pattern of the society. The story of the library gives
indication of the educational, social, economic and technological changes. Library collections in
the different countries represent their cultural identities. Language is at the heart of these
institutions. They are the collectors and stewards of our heritage.
b) It Represents the History of Civilization: Library history is an essential chapter in the
history of the intellectual development of civilization. It parallels the history of writing and
forms a component of the history of human civilization. It is the basic metaphor with which the
cycle of civilization began the step from the dark into the light of the mind.
The story of the growth and development of libraries forms an integral part of the history
of the peoples being served by it. A library does not exist for its own sake. Its objectives, role,
functions, services and kinds depend upon the needs of the people served by it. It is an extension
of the human memory. It is the repository of human culture, oral and written. The heritage of
man has been preserved for posterity in different containers of information.
2. Preconditions for the Emergence and Development of Libraries: Libraries tend to prosper
when a combination of certain social, political and economic conditions exist in a society. The
following are the preconditions for the emergence and development of libraries in any country:
a) Recorded Literature: Existence of recorded literature and the one worthy of being preserved.
b) Need of Preserving and Transmitting the Knowledge: Political and cultural maturity in a
society which recognizes the necessity of preserving, transmitting, and enlarging the body of
knowledge.
c) Literate Population: The existence of a literate population and the willingness on the part of
the community to use its resources create a proper environment for the creation and development
of libraries. The cultural and intellectual interest to stimulate the use of the library also plays a
great role.
d) Leisure Time: Nowadays the individual has both the leisure and the means to “cultivate the
finer arts and improve the common stock of knowledge”.
e) Secure Society: Library develops during stable social climates where there are periods of
relative peace and tranquility that enable the individuals to pursue leisure activities, and when the
country or an institution becomes stable and the security of tenure offers permanence and
continuity.
f) Financial Support: Economic prosperity and a surplus of wealth are needed to provide the
financial support for the growth of the library. The economic prosperity provides a sizeable
section of individuals and the corporate world with wealth and encourages philanthropic giving.
When society’s other institutions- its school, college or universities – need to educate and
inform its members, libraries also become an important supplement to the former.
3. Social Origin of Library: Looking back it may be observed that at different stages of history
the social forces have made their impact on the origin and development of libraries. Before the
advent of printing technology the manuscripts libraries were strictly restricted both in form and
content to the scholars in the community. In the 17th century the Kings, Emperors and Noble men
maintained their libraries as symbol of prestige and aristocracy in the society. It was by the
middle of the last century that the social forces came into play to revolutionize the character of
the library movement making it more and more a public institution. Among a vast number of
forces behind the library movement the following are three chief social forces at work:
a) Religion: It was the religious belief in our country that free gift of knowledge would bring
credit for the knowledge givers in the next birth. Manu, the codifier of law in
ancient India prescribed that gift of books was the highest of all gifts. So, religious forces are
also instrumental in the growth and development of libraries.
b) Industrial Revolution: The industrial revolution made great impact on the concept of
libraries transforming it from royal and personal library to democratic one for the benefit of the
people. Due to industrial revolution every country faced with the emerging problems of
increased leisure, high standard of living and greater accumulation of private and community
wealth. These conditions supported the creation and development of public institutions like the
library for the benefit of the people.
c) Information Revolution: Since the invention of printing, there has been a continuous
revolution in the generation, transfer and communication of information. The role of information
further receives new proportions with the acceleration of research, mounting social and
population pressure and so on.
6. Role of Library in Society: A library does not exist for its own sake. It exists to serve the
need of the community or the parent organization. Its objectives are the same as those of its
parent body. It assists in the achievement of those objectives as detailed below.
a) Communication of Knowledge: The information and knowledge has become increasingly
complex and at the same time the means of communication of information and knowledge are
also becoming equally complex. For the growth and development of a modern society,
communication of knowledge has become increasingly important. All citizens must be able to
find and use information. It is the key raw material and the libraries are the access points to it. A
library is concerned with the communication of information and knowledge and helps in
communication through user friendly devices by providing repackaging of information. It
disseminates information according to the needs of the individuals on anticipation or on demand.
b) Information Centre: We are living in an information age in which information plays an
important role in today’s complex, economic, political and social environment. The researcher,
the teacher, the student, the administrator, the industrial and business managers, the entrepreneur,
the farmer, the workers in a factory, etc all need information to equip themselves better for the
fruitful pursuit of their respective vocation. It can help farmers to improve production by using
different agricultural information. It enables businessmen to improve their business prospects. It
can help students of all ages. It provides job information for the unemployed youth, helps people
looking for better prospects and so on.
c) Education: Education is considered the most important activity forming the backbone of the
progress of a nation. Education strengthens the very fabric of a nation. It helps to produce men of
integrity, vision, character and, above all, democratically conscious citizens.
i) Formal Education: Formal education is the hierarchically structured, chronologically graded
education system, running from primary school through the university. Formal education is the
one that an individual attains by enrolling himself in an educational institution like a school or a
college or a university and through constant teacher student contact.
In formal education, libraries support the courses of study by providing systematic
collection at all levels. They recognize the requirement of teacher and student alike. It is through
the extensive reading of a variety of books bearing on a subject that a student will be able to
acquire in-depth knowledge of the subject. By being able to analyze and compare different view
points as expounded in different books a student will be able to develop his capacity for
analytical and critical thinking. This will enable him to formulate independent view points and
opinion. The basic function performed by academic libraries is to support formal education.
Public libraries also collect such material to cater to the students’ need in some cases.
ii) Non-formal Education: Non-formal education is an organised educational activity outside
the established formal system - whether operating separately or as an important feature of some
broader activity - that is intended to serve identifiable learning clienteles. In non-formal
education one educates oneself through courses offered by the distant education mode with the
help of either other methods of learning or through self study materials. The main responsibility
of supporting the non-formal education rests with the public library system.
Education of Illiterates: The public libraries work for the education of the illiterate people in its
community through the audio-visual media especially the video tape. It also establishes learning
clubs and organizes other programmes of oral communication for educating its illiterate clients.
Education of Working Groups: Public libraries stock books relevant to the needs of the people
engaged in different vocations in its area. By reading such books they will become better
informed and better educated in their areas of work. They may be sufficiently interested to
increase their work efficiency which will lead to greater productivity.
Education of Physically Handicapped: In recent years public libraries have provided reading
materials and other documents to the handicapped readers to alleviate their miseries, have
assisted the disadvantaged members of society in gaining a rightful place in society besides
educating and rehabilitating them in society.
iii) Informal Education: Informal education is a lifelong process whereby every individual
acquires attitudes, values, skills and knowledge from daily experience and the educative
influences and resources in his or her environment - from family and neighbours, from work and
play, from the market place, the library and the mass media. Informal education can contribute to
learning a new job or transferring skills which were not necessarily the principal skills for a
previous job. These include communication, organizational and time management skills and the
ability to set priorities. Sometimes only a few weeks or a month of "on-the-job training" can
assist an individual to be able to perform a new job. Informal education also includes learning
and specialized skill development pursued in job-sponsored orientation courses (e.g. computer
training courses, project management).
iv) Lifelong Learning (LLL): The whole idea of education is to stress more and more
independent learning and acting. All learning activities are undertaken throughout life, with the
aim of improving knowledge, skills and competencies within a personal, civic, social and/or
employment-related perspective. The necessary implication is that the professional and
vocational competence of the members must be maintained with the changing needs of the
society.
d) Research: Research extends the frontiers of knowledge. Human beings appear to stand alone
among the earth’s creatures in their desire to understand their environment better and the world
around them. This requirement can be partially satisfied by the knowledge gained as a result of
daily occurrence. The formulation of generalization takes place on the basis of first hand
experience and the use of logical reasoning. A more effective approach to expand knowledge
however is the conduct of planned and structured investigation- a process known as research.
Both material and cultural progress of the society depends on research. It is now recognized as
the life blood of the modern society.
Access to existing knowledge and information is essential for research. Every library
attached to an institution collects the knowledge that is newly created and primarily
communicated through journals, research reports and other similar publications to support its
own research programmes.
e) Safeguard Democracy: Libraries have been identified as one of the key elements for open
access to information, which is crucial to democratic society for its growth and development. It
safeguards democracy, creating political awakening, bringing social awareness, and fostering
creative leisure activities.
f) Recreation and Leisure: The healthy use of leisure is a matter of great importance in
community life so that leisure time is not devoted to negative and destructive activities. The tired
and bored people like to escape from their drab little world to identify themselves with romantic
excitement and creative recreation. The libraries provide for one and all harmless and elevating
use of leisure. Novels and other similar forms of literature, works of arts, books of travels,
popular magazines, etc. are primary books of recreation and they have found a place in every
kind of libraries. Besides, public libraries organize programmes for healthy recreation and
entertainment like the performing arts, musical concerts, etc.
g) Cultural Centre: A society cannot function without some cohesive forces to hold it together.
That force is known to the anthropologist as culture. Ancient Byzantines and the Arabiaess used
libraries primarily to preserve their recorded cultural heritage for the posterity. Libraries attached
to medieval monasteries also perform this function admirably. In today’s context also local
libraries should undertake to take care of books and other material related to local history and
other subjects of local interest. A national library holds the national output. Besides, it preserves
the cultural heritage of the human race as represented by the books and other documents it holds.
It also plays a cultural role in two other senses. Firstly, it makes available books which would
bring to expression the creative talents of individuals and develop their faculties for aesthetic
appreciation. Secondly, it also organizes cultural programmes like music concerts, dances,
dramas, paintings competitions for children, exhibition of painting etc and thus enriches the
cultural life of the community.
h) Religious and Moral Instruction: The use of libraries for religious and moral instruction was
practiesed by all early civilizations. Monastery libraries established during the Middle Ages and
the libraries attached to ancient churches, ashramas, mutts, satras and other religious bodies have
primarily existed to support religious and moral instruction. All public libraries also possess
spiritual and religious books, books that propound ideological themes, and other books of
permanent value which may be described as classics. These types of collections are for
inspiration. They meet the spiritual, religious and theological needs of their followers. Every
other kind of library has also a representative collection of books of this type to inspire people to
high ideas in life and inculcate values in them.
i) Inspiration Centre: A public library can create in children a love for reading, which can lead
to formation of reading habits at an early age. It prepares people for disciplined and cooperative
social life.
j) Instrument of Social Change: Information is power and at present it is being regarded as a
national resource perhaps as fundamental as energy or matter or water and air, which affects all
human activities. It is indispensable and so it needs to be put in the service of the whole
community.
7. Changing Role of Library and Information Science Centres: The information society
demands to re-define and re-evaluate the position and objectives of all the institutions which
work with information, knowledge, and culture. In modern society special emphasis is laid on
literacy, adult education, formal education, life long education, dissemination of information, etc.
so that every person may make the best use of their life in the society, becomes good citizen and
discharge their social responsibilities besides supplementing their traditional knowledge and
experience about their own vocation or calling.
Above all, modern libraries are information centres. Nowadays it does not restrict itself in
procuring the books only but goes to the extent of CD ROM, DVD, network information, sharing
information among the like minded institution in the form of consortia and so on. The change
can be viewed from four angles.
i) Change in demand: A change from just in kind to just in time is a major shift.
ii) Change in structure of libraries: Emergence of the concept of data centre, data bank, data
consolidation and evaluation centre, learning resource center, documentation centre, clearing
house, information analysis centre, referral centre, etc.
iii) Change in services: Providing CAS, SDI, consultant, literature search, information broker,
gate keeper of information, etc services.
iv) New Information products: Emergence of the digest, newsletter and such others.
8. Let Us Sum Up: In modern societies cultural values are changing. A new social awareness
has emerged as we become more diverse, more independent and more highly educated. More
than ever before the modern societies acknowledge the right of every individual to be free, to
participate in democratic processes, and to strive for achieving his or her fullest potential. When
we consider such high expectations of the society in respect of man as individual, we realize the
full potential of the library as a social institute.
The culmination of centuries of advances in the printing press, cast-iron type, paper, ink,
publishing, and distribution, combined with an ever growing middle-class, increased commercial
activities and consumption, new radical ideas, massive population growth and higher literacy
rates forged the public library into the form that it is today.
Though, in the above, an attempt is made to categorize the different types of libraries based on the technology used
but in reality there is no strict line of demarcation between the last four types of libraries.
2.3 UNESCO’s Division: An overall classification of all types of libraries has been made by
UNESCO in “Recommendations concerning the international standardization of library
statistics” adopted by the General Conference at its 16th session (Paris, November 13, 1970).
a) National libraries
b) Libraries of institutions of higher education
i) University library
ii) Libraries attached to university / institute or department.
iii) Libraries which are not part of a university.
c) Other major non specialized libraries
d) School libraries (Size of collection only printed materials and manuscripts).
i) Up to 2,000 volumes.
ii) From 2,001 to 5,000 volumes.
iii) More than 5,000 volumes.
e) Special libraries open to the public.
f) Special libraries, reserved for their primary user.
g) Public (or popular) libraries financed by the public authorities, size of collection (Only printed
material and manuscripts).
i) Up to 2,000 volumes.
ii) From 2,001 to 5,000 volumes.
iii) From 5,001 to 10,000 volumes.
iv) More than 10,000 volumes.
Based on the entity i.e institution, municipality, or corporate body that supports or
perpetuates the library, library can be divided into Academic libraries, Corporate libraries,
Government libraries, such as national libraries, Historical society libraries, Private libraries,
Public libraries, School libraries, Special libraries, etc. Again, based on the collection of the
library material, library can be divided into Digital libraries, Data libraries, Picture (photograph)
libraries, Slide libraries, Tool libraries, etc.
Libraries can also be grouped based on the thought contents of procuring document as
Architecture libraries, Fine arts libraries, Law libraries, Medical libraries, Theological libraries,
etc. It can also be grouped based on the user or patron of the library as Prison library, Library for
blind, Public library, Military community’s library, Children library (actually children library has
grown as an offshoot of the public library functioning as a part of it. In some cases it has grown
independently), Private library, etc.
Let Us Sum Up: Libraries are by far the oldest institutions charged with the responsibility of
collecting, storing and disseminating of information. In a more traditional sense a library was
defined as “a place where books were kept for reading study or reference”. It is a collection of
books or other written or printed materials, as well as the facility in which they are housed to
serve the reader within an institution that is responsible for their maintenance. But a modern
library with a few exceptions is regarded as a service institution. Its aim is to enable the users to
make the most effective use of the resources and services of libraries. A modern library is a
public institution which is expected to convert the potential reader into actual reader.
In ancient days libraries gathered huge collection of manuscripts and preserved them
most efficiently for the posterity. Modern libraries may contain a wide range of materials,
including manuscripts and pamphlets, posters, photographs, motion pictures, and videotapes,
sound recordings, and computer databases in various forms.
Libraries are the carriers of information from one generation to the next generation. Most
of the new technology based information businesses are still largely dependent on the library for
their survival. The information broker, consultants, referral centre etc still largely depend on the
library for their survival. In these days of Information Technology (IT) libraries continue to serve
millions of grateful users in new and improved ways and it is hoped that in near future also it
will be the only affordable source of information.
More recently, libraries are understood as extending beyond the physical walls of a
building, by including material accessible by electronic means, and by providing the assistance
of librarians in navigating and analyzing tremendous amount of knowledge with a variety of
digital tools.
National libraries are responsible for acquiring and conserving copies of all significant
publications published in the country and functioning as a “deposit” library, either by law or
under other arrangements. It also produces a national bibliography, holds and keeps up to date a
large and representative collection of foreign literature including books about the country, acts as
a national bibliographical information centre, compiles union catalogues, and publishes the
retrospective national bibliography.
Public library serves the population of a community or region free of charge or for a
nominal fee. An academic library serves an institution of higher learning and is located on the
campuses of colleges and universities for the benefit of the students and faculty of that
organization. A school library or a school library media center is a library within a school where
students, staff, and often, parents have access to a variety of resources. Libraries had often been
started with a donation, an endowment or parishes, churches, schools or towns, and these social
and institutional libraries formed the base of many academic and public library collections of
today.
Special library is established, supported and administered by a business firm, private
corporation, association, government agency, or other special-interest group or agency to meet
the information needs of its members or staff in pursuing the goals of the organization.
An archives is a place for storing earlier and often historical, material. It usually contains
documents (letters, records, newspapers, etc.) or other types of media kept for historical interest.
The inactive records of an individual, organization, or institution are kept in archives for their
continuing value. Private or personal libraries are mostly made up of non-fiction and fiction
books.
Librarians in Different Types of Libraries
Librarians in Different Types of Libraries: The librarians of different types of libraries have to
perform work according to the library concerned. Following are the different types of libraries
where librarians have different types of work to perform
a) School: The school librarianship covers the library services for children in schools. In some
regions, the local government may set the standards for the education and certification of the
school librarians (who are often considered a special kind of teacher). School librarianship may
also include issues of intellectual freedom, pedagogy, and how to build a coordinated curriculum
with the teaching staff.
b) College and University: The college / university librarianship covers the library services for
colleges / universities. Issues of special importance to the field may include copyright,
technology, digital libraries, and digital repositories, academic freedom, open access to scholarly
works and specialized knowledge of subject areas which are considered important to the
institution. The librarian of a college / university library caters to a large number of user base and
therefore, involves higher responsibilities than his counterpart in a school library.
c) Public: The librarianship for public libraries covers issues such as cataloguing, collection
development for a diverse community, information literacy, community standards, etc. It is a
librarianship with focus on public service and serving a diverse community of adults, children,
and teens, and therefore, deals with intellectual freedom, censorship and legal and budgeting
issues.
d) Special: Special librarians include those who are involved with any other form of
librarianship that serves in medical libraries (and hospitals or medical schools), corporations,
news agency libraries, or other special collections. The issues in these libraries will be specific to
the institutions / industries they inhabit. But the librarians in these libraries also include for their
work such specialized functions as corporate financing, specialized collection development, and
extensive self-promotion to potential patrons.
e) Archives: This covers the study required to maintain and build the archives of records
intended for historical preservation. Special issues include physical preservation of materials and
mass de-acidification, specialist catalogues; solo work, access, and appraisal. Many archivists are
also trained historians specializing in the period covered by the archive.
Librarian’s Day
Librarian’s Day: At the 9th Indian Association of Special Libraries and Information Centre
(IASLIC) seminar held at Nagpur (1980) initiative were made to form JOint Council of Library
Association of India (JOCLAI). In the JOCLAI meeting held at Jaipur during the seventeenth
conference in 1989 it was decided to observe the birth day of Shiyali Ramamrita Ranganathan,
the father of Library Science in India as Librarians Day all over the country every year. So
considering this, 12th August, which was the birthday of Dr. S. R. Ranganathan has been assign
as librarian’s day.
At Kolkata since 1990, a day long Programme purely professional is held every year not
necessarily on 12th August but on Sunday following the date. This is as because librarianship is a
service profession so the user cannot be disappointed on working days in the name of the
profession itself. This is what librarianship is.
Librametric, Bibliometric, Scientometrics, Informetrics
Librametric, Bibliometric, Scientometrics, Informetrics: The Librametric, bibliometric,
scientometrics, informetrics are overlapping areas, though their scopes are not the same.
1. Librametry: Dr. S. R. Ranganathan coined the term librametry and presented his concept in
1948 at the ASLIB conference held at Lemington Spa. He said that “there is a need to develop
this subject on the lines of Biometry, Econometry, Psychometry, etc. He used the term to include
statistical approaches to the study of library and its services. However, the practice of using
quantitative method to measure information sources were made even before Dr. S. R.
Ranganathan either under different name or without any name at all. For instance E. J. Cole and
Nellie Eales in 1917, graphically mapped the literature and called this as “Statistical analysis”, E.
Wyndham Hulme in 1922 studied the literature and called it “statistical bibliography”, but the
terms were found to be clumsy as it could easily be mistaken.
2. Bibliometrics: The formal term “bibliometric” was first used by Alan Pritchard in his article
“Statistical bibliography or bibliometric” in 1969 published in the “Journal of Documentation”.
“Biblio” means book and “metric” means a scale or measure. Bibliometric means application of
statistical studies in library and information science.
Pritchard defines bibliometric as “the application of mathematical and statistical methods
to books and other media of communication”.
Potter defines bibliometric as “the study and measurement of the publication pattern of
all forms of written communication and their author”.
Thus bibliometric is a sort of measuring techniques by which interconnected aspect of
written communication can be quantified. It is the study, or measurement, of texts and
information. Bibliometrics utilizes quantitative analysis and statistics to describe patterns of
publication within a given field or body of literature. Researchers may use bibliometric methods
of evaluation to determine the influence of a single writer, for example, or to describe the
relationship between two or more writers or works. One common way of conducting bibliometric
research is to use the Social Science Citation Index, the Science Citation Index or the Arts and
Humanities Citation Index to trace citations.
a) Bibliometric Techniques: There are different kinds of bibliometric techniques. For example-
i) Productivity Count: It deals with books articles, words in a text, place of publication, subject
matter, time and date of publication, publishing institution, authors, author’s institution, etc.
Nicholas and Ritchie in the book “Literature and Bibliometrics” called it as productivity count or
descriptive.
ii) Literature Usage Count: It deals with citation in published works, circulation, frequency of
borrowing or browsing different library material, failure and success in search strategies, search
option , etc. Nicholas and Ritchie called it as “Evaluative”.
b) Laws of Bibliometrics: One of the main areas in bibliometric research concerns the
application of bibliometric laws. The three most commonly used laws in bibliometrics are -
Lotka's Law of Scientific Productivity, Bradford's Law of Scatter, and Zipf's Law of Word
Occurrence;
i) Lotka's Law of Scientific Productivity: In 1926, Alfred J. Lotka proposed an inverse square
law relating to scientific papers to the number of contributions made by each author. Lotka's Law
describes the frequency of publication by authors in a given field. It states that ". . . the number
(of authors) making n contributions is about 1/n² of those making one; and the proportion of all
contributors, that make a single contribution, is about 60 percent". This means that out of all the
authors in a given field, 60 percent will have just one publication, and 15 percent will have two
publications (1/2² times . 60), 7 percent of authors will have three publications (1/3² times . 60),
and so on. According to Lotka's Law of scientific productivity, only six percent of the authors in
a field will produce more than 10 articles.
Lotka’s equation is xn.y= Constant.
Where
Y= Frequency of authors making n contribution, the value of the constant was found to
be 0.6079
ii) Bradford's Law of Scatter: Samuel Clement Bradford in 1934 points out that if scientific
journals are arranged in order of decreasing productivity of articles on a given subject, they may
be divided into a nucleus of periodicals more particularly devoted to the subject and several
groups and zones containing the same number of articles as the nucleus when the number of
periodicals in the nucleus and succeeding zones will be 1: n: n2.
Bradford's Law states that journals in a single field can be divided into three parts, each
containing the same number of articles:
* A core of journals on the subject, relatively few in number, that produces approximately one-
third of all the articles;
* A second zone, containing the same number of articles as the first, but a greater number of
journals, and
* A third zone, containing the same number of articles as the second, but a still greater number of
journals.
The mathematical relationship of the number of journals in the core to the first zone is a
constant n and to the second zone the relationship is n². Bradford expressed this relationship as 1
: n : n². Bradford formulated his law after studying a bibliography of geophysics, covering 326
journals in the field. He discovered that 9 journals contained 429 articles, 59 contained 499
articles, and 258 contained 404 articles. So it took 9 journals to contribute one-third of the
articles, 5 times of 9, or 45, to produce the next third, and 5 times 5 times 9, or 225, to produce
the last third.
Bradford's Law serves as a general guideline to librarians in determining the number of
core journals in any given field. Bradford's Law is not statistically accurate, but it is still
commonly used as a general rule of thumb.
iii) Zipf's Law of Word Occurrence: George K. Zipf, 1947 states that if the words occurring in
a natural language text of sizable length were listed in the order of decreasing frequency then the
rank of any given word in the list would be inversely proportional to the frequency of occurrence
of the word. Zipf’s equation is
r.f=k
Where
r = Rank;
f = Frequency of Word;
k = Constant
The Law states that in a relatively lengthy text, if you "list the words occurring within
that text in order of decreasing frequency, the rank of a word on that list multiplied by its
frequency will equal a constant. The equation for this relationship is: r x f = k where r is the rank
of the word, f is the frequency, and k is the constant. Zipf illustrated his law with an analysis of
James Joyce's Ulysses. "He showed that the tenth most frequent word occurred 2,653 times, the
hundredth most frequent word occurred 265 times, the two hundredth word occurred 133 times,
and so on. Zipf found, then that the rank of the word multiplied by the frequency of the word
equals a constant that is approximately 26,500".
c) Uses of Bibliometric Studies: Historically bibliometric methods have been used to trace
relationships amongst academic journal citations. The bibliometric research uses various
methods of citation analysis in order to establish relationships between authors or their work.
The Bibliometric studies are used in
i) Measuring the scattering of articles on a subject in various periodicals (Bradford).
ii) Measuring the productivity of an author based on the number of published articles. (Lotka).
iii) Ranking of words in a text based on frequency of occurrence of words.
iv) Productivity count of literature.
v) To identify the peers, social change and the core journal, etc.
vi) Indexing and Thesaurus;
vii) Research;
viii) Formulating search strategies in case of automated system;
ix) Comparative assessment of the secondary services;
x) Bibliographic control;
xi) Preparation of retrospective bibliographic and
xii) Library Management.
3. Scientometrics: This term was introduced and came into prominence with the founding of the
journal named “Scientometrics” by T. Braunin in 1977, originally published in Hungary and
currently from Amsterdam.
The term “Scientometrics” was used to mean the application of quantitative methods to
the history of science but it is now generally used as a generic term for a variety of research
approaches within the study of science that a quantifiable aspect of science can be utilized to
assess the characteristic of science.
Marton and Garfield have defined it as the field of enquiry given over to the quantitative
analysis of science and scientific field.
4. Informetrics: According to Brooker the term “informetrics” was first proposed by Otto Nacke
of West Germany in 1979. It focused on information productivity. It interprets information
technology and considers interaction of information theory, cybermetrics, decision theory, etc.
5. Webmetrics: Webmetrics can be defined as using of bibliometric techniques in order to study
the relationship of different sites on the World Wide Web. Such techniques may also be used to
map out (called "scientific mapping" in traditional bibliometric research) areas of the Web that
appear to be most useful or influential, based on the number of times they are hyperlinked to
other Web sites.
6. Let Us Sum Up: According to Sen, bibliometric deals with document and its component
while informetrics studies pertaining to information. Morales use the term informetrics to cover
almost all the aspect of bibliometric and librametrics.
Learning Management System (LMS)
Learning Management System (LMS): A Learning Management System (LMS) or
Courseware Management System is a software application for the administration,
documentation, tracking, and reporting of training programmes, classroom and online events, e-
learning programmes, and training content.
LMSs range from systems for managing training and educational records to software for
distributing courses over the Internet with features for online collaboration. Student self-service
(e.g., self-registration on instructor-led training), training workflow (e.g., user notification,
manager approval, wait-list management), the provision of on-line learning (e.g., computer-
based training, read & understand), on-line assessment, management of continuous professional
education (CPE), collaborative learning (e.g., application sharing, discussion threads), and
training resource management (e.g., instructors, facilities, equipment), are dimensions to
Learning Management Systems.
The following are some of the popular LMS softwares
a) ATutor: ATutor is an Open Source Web-based Learning Management System (LMS). It is
used in various contexts, including online course management, continuing professional
development for teachers, career development, and academic research. The software is cited as
unique for its accessibility features, (useful to visually-impaired and disabled learners); and for
its suitability for educational use. Website: http://www.atutor.ca/
b) Brihaspati (The Virtual Classroom): Brihaspati is an open source learning management
system and of Indian origin. Website: http://home.iitk.ac.in/~ynsingh/tool/brihaspati.shtml
c) Claroline: Claroline is a collaborative eLearning and eWorking platform (Learning
Management System) released under the GPL Open Source license. It allows hundreds of
organizations worldwide ranging from universities to schools and from companies to
associations to create and administer courses and collaboration spaces over the web. Website:
http://www.claroline.net/
d) Moodle: Modular Object-Oriented Dynamic Learning Environment (Moodle) is a free and
open-source e-learning software platform, also known as a Course Management System,
Learning Management System, or Virtual Learning Environment (VLE). It is developed by
Martin Dougiamas to help the educators create online courses with a focus on interaction and
collaborative construction of content. Website: http://moodle.org/
Leadership
Leadership: Leader is a person who is like everyone else and have personnel needs and hopes.
In addition, he enjoys the formal authority and power of an influential position. The task of
leader is called leadership. The term leadership therefore can be defined as exercise of influence
in an organization in which the other persons attribute leadership qualities to the leader.
The leader should create a framework for activities, maintain norms and policies
motivate fellow members of the group and allow others to prove their efficiency. He should be
aware of changes in the wider environment and in the internal structure of the organization. In a
particular situation, the leader has to take the right decision for organizing and implementation
of a task.
a) Qualities of Leader: There are different theories which describe the qualities and function of
leader differently. Some of them are as follows-
i) Personal quality theory: This theory has been emphasized in Trait theories in which leader is
accepted as superior and the subordinates are expected to follow him by virtue of his personal
qualities.
ii) Environmental theory: The leadership is based on providing solution in a given crisis. The
leader may not be successful in a different situation.
iii) Personal – environmental theory: It gives emphasis on personal characteristics, capabilities
of managing various situations and the response of subordinate to accept the leadership.
iv) Exchange theory: Group interaction and its results are the focal concept of this theory.
v) Humanistic theory: It gives emphasis on the leadership of persons who will grant maximum
freedom to enable group member to achieve high level of self actualization having total
involvement in all affairs leading to success.
vi) Expectational theory: It is based on leadership to be gained by a person who is able to
maintain the aim and goals as well as to motivate the group.
vii) Contingency theory: No fixed patter of leadership behaviour can be effective in all situation.
In a particular situation the leader must design his own pattern to achieve the best result. The
contingent factors are the personality of the leader. The successful leader must be person-
oriented and task-oriented and should be capable of understanding the particular situation.
In the complex social situation while there are changing conditions under external
influences no one pattern of behaviour and approach is equally effective in all circumstances.
Some common qualities of leader are-
i) Hard worker and intelligent;
ii) Well qualified, academically and professionally;
iii) Entrepreneur;
iv) Always resourceful;
v) Spokesman and disseminator;
vi) Disturbance handler or conflict handler;
vii) Resource allocator;
b) Librarian as a Leader: The librarian should have the qualities of a leader so that his
subordinate derives inspiration from him. He should always stand in favour of his subordinates
interest and enthusiasm for the profession and loyalty to the organization by his own examples.
Today most of the librarians are discharging their function as a leader.
i) Secretary of the library committee: Librarian’s are the member secretary of the library
committee and it is his duty to prepare the agenda for the committee meetings.
ii) Conference, seminar, orientation: Librarians nowadays attending conferences, seminars, and
conduct regular orientation class for the new members of the library.
iii) Solves problems of the library: Due to the rapid changes in environment and in the education
trend libraries are always facing problem. The librarian as a well qualified person academically
and professionally so his subordinate when confronted with various problem are able to seek
solution from the him.
iv) Take decision: Librarians can take decision in library matter.
v) Gives order and direction: Orders and direction and instruction are issued from the librarian
and these are implemented by the respective level of subordinates.
vi) Represent the library and staff: The librarian represents the library and its staff in all internal
and external matter.
vii) Guidance and motivation of the staff: The librarian guides, directs and motivates all his
subordinates who work with and for him to accomplish the results as per the plans and policies.
Librarians also build confidence among the library staff.
viii) Building morale: Morale is expected as attitude of the staff towards organization. High
morale leads to high service. Librarian builds the morale of the staff.
c) Problems for the Librarians: Some of the problems associated with the librarian in carrying
out the leadership roles are –
i) Majority of librarians in school and public libraries have not any subordinate staff. So, they
cannot perform their function as a leader.
ii) The librarians generally do not get proper recognition from the parent organization and from
the society. This creates emotional problem to carry out the function of a leader.
iii) The salary and wages of the private sector librarians generally are not up to the mark. So
they don’t feel motivated to perform their function as a leader.
iv) The majority of old librarians are less qualified academically and professionally. So they
cannot compete with the member of the parent organization to discharge their duties as a leader.
Terms
Hypothesis: Proposed
explanation of some thing made
on the basis of limited evidence
used as a starting point for further
investigation.
b) Helps Library Science to Become an Independent Subject: A subject cannot stand in its
position unless some fundamental laws are not attached to it, so by proposing the laws
Ranganathan put the first stone in this direction.
c) Denote Library Practices: Laws of library science contain in a latest form all the library
practices of the past and the present and those which are likely to be evolved in the future.
d) Serve as a Higher Court: These laws are applicable to any problem in the areas of library
science, library service and library practice. In case of conflict between canons, an appeal is
made to the five laws of library science to resolve the conflict.
e) Boundary Condition: Laws of library science locate the boundary condition within which
the librarian might work.
2. Usefulness of the Five Laws
a) Act as Fundamental Laws: The five laws of library science are fundamental laws of library
and information science and are applicable to any problem in the areas of library science, library
service and library practice. Five laws are guiding norms; these are the verified principles
applicable everywhere in the library world.
b) Help in Deriving Canon, Principles and Postulates: With the help of these five laws of
Library Science we can derive canons, principles and postulates applicable in different fields of
library and information science. These fundamental laws will serve as a source of inspiration and
guidance in the years to come.
c) Resolve Conflict Between Cannons: The laws of library science help in solving any conflict
that may arise during the functioning of libraries. The five laws serve as a higher court. So in
case of conflict between canons of cataloguing, classification etc. an appeal is made to the five
laws of library science to resolve the conflict.
d) Guiding Rules: The laws of library science guide the staff in decision making about what is
right and what is wrong in a given situation. As such Ranganathan’s five laws of library science
have found universal acceptance as Pentagon of Library Philosophy.
3. Variants of the Five Laws of LIS: According to Ranganathan’s own words “One is the
generalization of the concept ‘Book’ this has been emphasized in recent years in the term
document”, so Ranganathan later on in his “Documentation and its Facets” reformulated the
laws as
a) Documents are for use.
b) Every reader his / her document.
c) Every document its reader.
d) Save the time of the reader.
e) Library is a growing organism.
In 1998, librarian Michael Gorman (past president of the American Library Association,
2005-2006), recommended the following laws in addition to Ranganathan's five in his small
book, "Our Singular Strengths":
a) Libraries serve humanity.
b) Respect all forms by which knowledge is communicated.
c) Use technology intelligently to enhance service.
d) Protect free access to knowledge.
e) Honor the past and create the future.
In 2004, librarian Alireza Noruzi recommended applying Ranganathan's laws to the web
in his paper, "Application of Ranganathan's Laws to the Web"
a) Web resources are for use.
b) Every user his or her web resource.
c) Every web resource its user.
d) Save the time of the user.
e) The Web is a growing organism.
4. First Law: Books are for Use: The first law embodies an elementary principle and all the
other laws of library science are based on the first law. The library becomes great not because of
its collection or building but as a result of the use made of by its users. Therefore, the motto of a
librarian should be to acquire process and serve document for use. The implication of this law is
limited to make the physical carrier of information accessible to the user. A modern librarian
who has belief in first law will feel satisfied only if the user keeps the shelves constantly empty.
In Ranganathan’s own words the implications of the first laws of library science are
a) Location of the Library: Location of the library should be the one which is conveniently
accessible to the community to be served. A public library should be at a place which most
citizens can frequently visit regularly on some business or other; at the same time the location
should be as free from noise and other disturbances as possible so that serious study can be
made. A University library should be centrally located. A special library should be near the
factory entrance or factory canteen. In case of school and college libraries the location does not
matter very much because distances are small from various sections. However it would be
preferable to have it centrally located.
b) Library Building and Furniture: The library building should be well planned. The exterior
should be inviting and the interior should be attractive. The building should be functional and at
the same time aesthetic. It should be functional one providing enough space for various purposes
to meet the requirements. The furniture should be so provided as to give comfort to the readers
and to make use of the resources of the library as conveniently as possible. Racks in which
books are kept should not be high and books on the top shelves should be easily reachable.
c) Library Hours: The opening hours of the library should be decided keeping in view the need
of the user. The influence of the first law on library hours has resulted in opening for long hours
and on all days of the year without any holidays. Library hours should also be convenient to the
users. If possible, each user of the library should be provided with a key of the library so that the
user can use the library at any hour, whenever he feels like using it.
d) Library Staff: In order to maximize the use of the library, it is essential that library staff
should be qualified and efficient. Every member of the staff should perform the role of a friend,
philosopher and guide to all those who come to the library to use it. The staff should believe in
and follow the philosophy of service to the user. They should be approachable, courteous,
helpful and willing to appreciate the point of views of others; a missionary zeal to serve the user;
amiable manners and professional competence are the essential qualities of the library staff for
carrying out the mandate of the first law.
e) Book Selection: The books should be selected and acquired keeping in view the present and
potential requirement of the user. There should also be a periodical weeding out of books.
f) Shelf Arrangement: The books should be classified, catalogued and arranged according to a
helpful sequence.
g) Reference Service: The personal service will lead to greater use of library document.
The forces of the first law can be looked at from the following-
In the ancient period books were rare i.e. multiple copies were not available due to the
non availability of printing machines. The copying of the Mahabharata was a very tough
requiring long hours to copy a document. So, in the past, there was a great deal of negligence
towards the first law. In modern times due to the availability of printing technology,
photocopying, scanning etc it is possible to overcome all such barriers. But unfortunately due to
the result of a rudimentary practice of preserving the documents, that tendency has remained as a
regular habit in the successive generation of librarians. The modern librarian should overcome
such a habit and there is an urgent need for the vigorous attempt to eliminate the negligence to
the first law.
A modern librarian who has faith in the first law is happy only when his/her reader make
his/her shelves constantly empty. Also in such cases he/she will go to them, not to snatch away
the book they are using but to distribute the new arrival that needs to be introduced to them as
quickly as possible.
The forces of the first law as a whole can be traced out as
- Make the library open access rather than traditional closed access;
- Make free access to the book world;
- Branch libraries should open in the larger cities in order to be easily reachable within a few
minutes walk from each house;
- Books should be sent free to the houses of those that would offer to get them introduced in their
neighborhood;
- Books should be carried in motor van from street to street for their distribution amongst the
residents.
The above forces of the first law will be possible only if library has enough funds and the
library itself obtains free copy of books from different sources. But in this industrialized world in
which everybody pays according to his/her need or requirement, there is a doubt that an
exception will happen for library and information science only. So the fulfillment of the first law
is bleak in near future. If library legislation comes to help in this regard or the readers of a
library are ready to pay according to their need, the law, Books are for use, can be satisfied in
every aspect.
In the fifteenth and sixteenth century books were actually kept in chains (chained library)
to confine their movement to the sphere determined by their chain. Such chaining was more
conducive to the preservation than to the use of the books. This practice was in contrast to the
first law of library and Information Science.
5. Second Law: Every Reader his / her Book: The second law is, every reader his / her book
(books are for all). According to the second law every reader of a library should have the books
he / she wants. It advocates for a mandatory provision of library services to each reader
according to his / her need. It advocates the universal and democratization of library services i.e.
documents are not merely for scholars but for all, including the poor, sick, blind, prisoner, neo-
literates and the old. The documents should be accessible irrespective of occupational and
income lines, irrespective of the normal and the abnormal, or irrespective of an adult and a child.
Ranganathan examines the implication of the second law under the following four
categories.
a) Obligation of the State
i) Library Legislation: In order to achieve the second law it is desirable that economy factor
should not stand as a barrier. This will be possible through library legislation, which will provide
for finance of public libraries at various levels to achieve free library services for all.
ii) Maintenance of a Library System (Network): As far as students, teachers and researchers are
concerned the public library plays only a marginal role in fulfilling the second law. Therefore,
the state also has the responsibility of establishing other types of libraries like school library,
college library, university library and special library.
iii) Co ordination and Resource Sharing: A given library would not have the finance to purchase
documents on occasional demand. Therefore the second law would suggest the formulation of a
National library network to share the resources, especially for the purpose of inter-library loan.
b) Obligation of the Library Authority
i) Choice of Book (Book Selection): The second law implies that all the books that can be useful
should be selected and all the useless books should be discarded. The selection should be based
on individual needs. The library authority should ensure the proper selection and acquisition
policy in order to build up a balanced collection in the library for each category of users i.e. the
blind, neo-literates, scholars, children, young, adult, man, women, etc. Buying a document that
has no potential demand is a violation of the second law.
ii) Choice of the Staff: The library authority should select an adequate and competent team of
library staff and it should take utmost care in the recruitment of the library personnel, their
subsequent promotion, recognition and status.
c) Obligation of the Library Staff
i) Open Access: The library staff should also feel the obligation to introduce open access to help
the readers in gaining access to all the books of possible interest to them. The open access makes
it possible for a reader to approach books directly and handle them personally without any
barrier. A user can, thus browse amongst the world of books and thus they will have better
chances of choosing the right book.
ii) Cataloguing: Some times the information contained in a chapter or a few pages of a book
may be of interest to a reader but the users often tend to miss such content. To avoid such
oversight the library should introduce subject analytical or cross reference entries.
iii) Shelf Arrangement: The shelf should be arranged according to the subject of the document
and not based on the size and other aspects.
iv) Maintenance: In case of open access libraries there is every possibility of some document
being misplaced intentionally or unintentionally by the patron of the library. To fulfil the second
law misplaced books must be restored to their proper places. Books in need of binding or repair
should be taken out from the shelves from time to time.
v) Reference Service: Reference service is an effective means of ensuring that the reader gain
access to all the documents of potential interest to him that are held by the library. So the library
staff should have proper training in reference work and be able to provide an effective reference
service to the user in getting the right book.
d) Obligation of the Reader
i) Library Rules Should be Followed: A user must realize that library rules are framed to get the
maximum out of the library resources and to prevent the misuse of library resources. The rules
are aimed at increasing the use of the library rather than curbing its use. Thus, the user should
regard the rigid enforcement of the rules as an aid rather than a hindrance in the use of the
library.
ii) Maintenance of the System: A user should not misplace the books within the library or
damage it. This will deprive the other users; similarly a user should not mutilate or take out cards
from the library catalogue, tear pages or steal etc.
iii) Should not Ask for Any Undue Special Privileges: The Library is meant for every body’s use
and no one should have undue privileges at the expense of others. The current issues, the
reference books etc which are in much demand should not go through the process of any special
privileges.
iv) Returns of Books In Time: The books that are borrowed must be returned on or before due
date so that other users do not have to suffer. If a document is lying unused at home, it is the
obligation of the user to return it as soon as possible.
6. Third Law: Every Book its Reader: Every book in a library must find its reader. This law
emphasizes the approach to the document. According to this law, every book in a library must
find its reader, not a single item should be lost in the darkness of the stack.
The following measures should be adopted for giving effect to this law.
a) Introducing Open Access: In the open access system books are arranged in shelves in the
classified order and the readers have freedom to access them. In the course of readers’ browsing
through the shelves they may come across books of interest to them the existence of which they
may not be aware of; so the chances of readers noticing the books and reading them are
enhanced by the open access system only.
b) Provision of Popular Department: The provision of popular department like newspaper
reading room, periodical section, etc. offer baits to the reader and such provision increases the
chances for every book to get its reader. Recent additions, rare books, specific collection, festival
collection etc displayed at prominent places attracts the reader’s attention.
c) Book Selection: Best attention should be paid to book selection so that the chances of books
remaining unused are reduced.
d) Cataloguing: Subject cataloguing, series entries, cross reference entries etc. may often reveal
to the reader the books which might not have otherwise been noticed.
e) Shelf Arrangement: If the shelf arrangement is made by the subject approach then there are
better chances of books finding their reader. Again, the subsequent attention should be given by
the library staff to maintain the arrangement by way of restoring the misplaced books to their
correct place and so on.
f) Reference Service: There must be the provision for personal assistance to each reader when
they feel they need it. The reference staff should act as a canvassing agent for book.
g) Publicity and Library Extension Service: Internally, within the premises of the library, the
staff should provide shelf guide, bay guides, etc. which will guide the reader to appropriate
places in the library. Externally, the reference staff should go to make the use of mass media like
press, radio, television, public lecture, demonstration, tours, exhibitions, library weeks, brochure
and leaflets, etc. for publicizing the library.
7. Fourth Law: Save the Time of the Reader: A user is supposed to be a busy person; so his /
her time must be saved. Corollary of this law is “save the time of the staff”. A reader coming to
the library should get an exact and fast service; they should not be made to wait longer than
necessary. Unnecessary delay may cause vexation and readers may be dissatisfied. Dissatisfied
readers may cease to come to the library.
The implications of the fourth law are as follows.
a) Location of the library: The library must be centrally located so that it is conveniently
accessible to the community being served.
b) Open Access: There are many advantages of introducing the open access. One of the major
advantages of open access system is the subjective time decline which gives satisfaction to the
readers.
c) Classification and Cataloguing: Proper Classification system which would bring together
documents on a specific subject and also the related subject should be adopted.
d) Shelf Arrangement: The arrangement of documents according to the degree of mutual
relationship of subjects would lead to saving the time of the readers.
e) Signage System: Stack room guide, bay guides, tier guides, gangway guides should be
provided to save the time of the reader.
f) Reference Service: The fourth law advocates the need of reference service.
g) Charging System: The issue method, charging and discharging should be done as quickly as
possible.
h) Centralized Cataloguing: Cataloguing in press, cataloguing in publication, cataloguing with
the aid of OCLC database greatly reduce the time factor.
i) Information Technology: The use of IT in libraries invariably speed up many activities. So to
fulfill the fourth law the IT should be introduced.
8. Fifth Law: Library is a Growing Organism: The main components of the library are
documents, the user and the staff. A library always grows in terms of documents, the reader or
the user and the staff. The growth of a new library can be compared to the growth of a child as it
grows in every aspect. In case of a service library that has attained certain degree of stability its
growth can be compared with the growth of the adult i.e. it grows in terms of replacing old
document by new one and new user will continuously replace the old one.
The implication of the fifth law of library and information science are:
a) Library Building: The library building should be modular and should have the provision of
future growth.
b) Choice of Classification and Cataloguing Code: The classification and cataloguing scheme
chosen should have the provision to keep apace with the development in the universe of subject.
c) Physical Forms of Catalogue: The physical forms of catalogue chosen should have the
provision of updating, sorting in different order, editing and so on.
d) Weeding out of Document: To make the space for new addition the documents that are
obsolete and unused should be weeded out. The weeded out document should be stored, where
they are available for occasional use or at a central place (a central library) with cooperation
among libraries.
e) Modernization, Computerization: Library that grows fast both in terms of size and services
may have to go for the computerization of various house-keeping operations (i.e. acquisition,
circulation, cataloguing etc). In order to take care of the growing collection the documents
should be digitized or microfilmed; the new procurement should be made in the form of
electronic journals, e-book, etc. To cope with the increased readership the library should go for
the video terminal and ultimately to the digital or virtual library.
Previously the libraries grew with the collection, but nowadays the digital library, or
virtual library or e-library does not show the characteristics of the growing of a library by
volume. The growth is in the use of sophisticated technologies.
9. Let Us Sum Up: Ranganathan’s five laws of library science consist of five short statements
but they provide guidance and rationale for practice and teaching of library and information
science. With the help of these laws, we can derive postulates, cannons and principles applicable
in different fields of library and information science. The first three laws emphasize the
exploitation of the documents of the library fully by the maximum number of users. The fourth
law gives emphasis on the role of reference librarian and has a great potentiality to bring reforms
in the running of libraries. All laws as a whole will serve as source of inspiration and guidance in
the years to come.
Knowledge Management (KM)
Knowledge Management (KM): There is no universal definition for knowledge management.
At its broadest, KM is the “process through which organizations generate value from intellectual
and knowledge based assets”.
Information management tries to make the right information available to the right person
at the right time though a variety of database driven information applications. Information
management tools try to capture the human experience of knowledge through collecting,
classifying, disseminating, searching, indexing, and archival power of technology. Information
management may well be considered the first wave of KM (and is still often considered
synonymous with KM).
a) Knowledge Assets: Knowledge assets are often described as the intellectual capital of an
organization. There are two types of knowledge assets –
i) Explicit or formal assets like copyrights, patents, templates, publications, reports, archives,
etc.
b) Tacit or informal assets that are rooted in human experience and include personal belief,
perspective, and values.
b) The Value of KM: Knowledge began to be viewed as a competitive asset in the 1980s,
around the same time that information explosion started becoming an issue. The trend was
fueled by the development of IT systems which made it simple to store, display, and archive
classified, indexed information. It is important to manage knowledge assets because –
i) Organizations compete increasingly on the base of knowledge (the only sustainable
competitive advantage, according to some)
ii) Most of our work is information based (and often immersed in a computing environment)
iii) Workforces are increasingly unstable leading to escalating demands for knowledge
replacement / acquisition.
Joint Academic Network (JANET)
Joint Academic Network (JANET): The JANET was inaugurated on 1st April 1984. It uses the
Science and Engineering Research Council Network (SERCNET) as a basis besides integration
of other research council network. It was formed for rationalize the existing U. K. networks and
build a national backbone services. It is now funded by Joint Information System Committee
(JISC) and managed by U. K. Education and Research Networking Association (UKERNA). All
U. K. universities together with other national bodies such as British library are connected to the
network.
The range of activities facilitated by JANET allows individuals and organisations to push
back the traditional boundaries of teaching, learning and research methods. For example,
JANET’s videoconferencing and video streaming capabilities are being used to deliver lectures
to remote groups of students. For researchers, the high capacity of the JANET backbone allows
the linking of large data storage and high performance computing facilities at a national and
international level. The other JANET services are -
a) Catalouging: Upto 1988 many libraries become successful in providing their catalogue to the
user through this network.
b) Database Service: JANET provides database services such as Cambridge Structural Database,
Inorganic Crystal Structures Data File, Crystal Data Identification File, Agricultural Database,
etc.
c) JANET OPAC: Through JANET OPAC one can access JANET catalogue and their database.
d) JANET News: This is a bulleting board service of JANET. Through which details of
informative materials of all libraries linked in the network are provided.
e) Email Service: JANET began its operation with the inauguration of Email.
f) JANET and Internet: JANET was directly linked to the internet via the JANET IP Service
(JIPS). This allows TCP/IP and JANET X 25 data on run over the JANET backbone.
g) Super JANET: It is a continuous up gradation policy of JANET for higher performance
computing. It upgrades the existing network infrastructure, not only the backbone but also the
network links right through to the user desktop.
The other services of JANET includes customer service, network status, network
services, JANET CERT, domain name registration, training, events and conferences, bringing out
publication.
It is found that there are number of networks in UK consisting of two or more universities.
All such networks irrespective of their particular network join in JANET. Sitting in one system
one can log on to another system through JANET.
The JANET network connects UK universities, FE Colleges, Research Councils, Specialist
Colleges and Adult and Community Learning providers. It also provides connections between
the Regional Broadband Consortia to facilitate the DfES initiative for a national schools’
network. Over 18 million end-users are currently served by the JANET network.
Job Description
Job Description: The purpose of job description is to identify a job for an employee. Job
description gives a full understanding of the activities to be performed, duties and
responsibilities. It differentiates the present job from other jobs and sets its outer limits.
For the recruitment of a professional staff, the librarian should clearly give a full
understanding of the activities to be performed, his/her duties and responsibilities. Operations
involved in each job are listed in proper sequence. Relations of various related jobs are indicated.
Mental and physical abilities for performing each operation are listed. The kind of training and
the length of experience required are also indicated. Wages payable along with other fringe
benefits are stated.
a) Guideline for a Job Description: The guideline for a job description are listed in the
following paragraphs-
i) Title of the job
ii) Provides explanation about the justification regarding the service to be provided, operation
involved in each job and they are listed in a proper sequence. The position for the job may be a
vacant or if needed new position should be created.
iii) Requisite materials, equipments, machinery and tools needed for the job are listed;
iv) Provides a clear demarcation of duties and responsibilities.
v) Mention to whom the employee is to be report to.
vi) Mention the subordinate to be supervised.
vii) Mention the relationship between this position and other position at an equal level;
viii) Identify the relationship of each position to the whole organization.
ix) Provide statement of the qualification for the position, physical abilities, kind of training
needed, length of experience needed;
x) Provide condition of work i.e. surrounding, the time of work, etc.
xi) Provide statement of the salary range and other fringe benefits.
b) Merit of Job Description: The following are the benefits obtained by preparing the job
description of each person in the libraries-
i) It satisfies the various administrative and personal needs.
ii) It gives a full understanding of the activities, duties and responsibilities to be performed by an
employee.
iii) It is essential for the purpose of recruitment, training needs and later for performance
appraisal.
c) Limitation of Job Description: The limitation of job description are-
i) Any job description cannot be perfect reflection of the job;
ii) Jobs are dynamic and so a job description can quickly go out of date;
iii) Job description demands constant revision to meet the changing needs.
Job Analysis
Job Analysis: A job is the smallest unit of a planned network of activities. Job is piece of work
or may be pieces of work to be done by an individual which lead to a result and becomes part of
an activity. It is assigned to a particular person to be done at a particular time.
Job analysis is the process of investigating and analyzing the functions in a work
assignment or group of assignment. The resulting facts aids in determining the relation between
the condition and requirement of the work and the individual who must do it. The job analysis is
a technique for investigating general work assignment or jobs.
Job analysis finds out which is to be done and determine the best method of doing it and
the qualification required by a worker to be able to do the job satisfactorily.
The data on the jobs can be collected from the concerned employees, their supervisors
and professional job analysts. The job data are obtained from the employees through
questionnaires, interview, discussion and observation. The data should include the specific
activities, responsibilities, special information needed by the employee, how the work is to be
performed, the required working condition and physical demand.
“Work analysis forms the very foundations on which personnel administration rests and
on which effective selection depends.” In case of a library, job analysis is the special
responsibility of the librarian. Job analysis helps to understand the step-by-step procedure of
each operation, time required for each job, professional skill and experience needed for each job
and the workflow in the library. If there is any bottleneck, it can be identified, located and
rectified. It also helps to understand and fix up the academic qualifications, professional training
and expertise for creation of posts and selection of persons for appointment. Thus with the help
of job analysis, the librarian can help the authority in the recruitment of right person in the right
post.
a) Purpose of Job Analysis: The purpose of job analysis are-
i) To determine the task that comprises the job;
ii) To determine the abilities, skill, knowledge and kind of experience required for carrying out
the job;
iii) To get maximum organizational effectiveness;
b) Advantages of Job Analysis: The advantages of job analysis are –
i) Job analysis helps to understand the step by step procedure of each operation, time required for
each job and thereby helps to know the work flow in an organization.
ii) Job analysis define labour needs in concern term.
iii) Job analysis spells out the types of workers required for each job i.e. academic qualification,
professional skill and experience needed for each job.
iv) It specifies the duties and responsibilities implied in each job;
v) It provides guidelines for providing facilities for education and training of right type of
personnel for each type of business or industry, etc.
vi) It provides a scientific base for fixing wages and salaries of various types of jobs and
employees because it takes into account the mental and physical skill, efforts and risks involved
in each type of job.
vii) It assists in organizational planning and provides coordination.
viii) It helps experimenting modern devices like time and motion studies, Program Evaluation
and Review Technique (PERT) and operation research which are instrumental in increasing
overall efficiency and productivity.
Internet Browsing and Searching
Internet Browsing and Searching: Searching or browsing in Internet environment is nothing
but retrieving of relevant results from the Internet.
a) Browsing: In Internet environment, browsing refers to opening a website through the web
browser that contains hyperlink and with the help of these hyperlinks, jumping to a new web
document in the same or a new window. It is also known as navigating or surfing the web.
i) Working with Address box of the Browser: In the online mode one can use web browser for
arriving at a particular address. In the “Address” box of the browser, typing the web site’s
address (URL) and pressing the “Enter” button of the keyboard or by pressing “Go” button, the
browser will open a particular website. When the web site opens, its home page is displayed. The
keying appropriate URL in the address box of the browser is obligatory. The website or home
page will contain links to other website or hyperlinks. By clicking on the highlighted words or
links one can access other files of the same website or entirely a different website.
ii) Working with Mouse: While we are on a webpage, we can use the vertical or horizontal scroll
bars to move around or through a document.
iii) Working with Keyboard Keys: We can use “Up” ( ) and “Down” ( ) arrow keys to move up
or down one line. Pressing the “Page Up” (PgUp) key moves up one window length, and
pressing “Page Down” (PgDn) moves down one window length. Pressing “Ctrl+Home” takes us
to the beginning of the document and pressing “Ctrl+End” take us to the end of the document.
iv) Working with Hyperlink in the Document: A webpage contains many hyperlinks in the form
of text as well as images. When you move your mouse cursor over the hyperlink it will take the
form of a hand with a pointing index finger (). You can open the hyperlink by just clicking on it.
You can also open a hyperlink by right clicking it and selecting the “Open” option from the
shortcut menu, or by selecting the “Open in a New Window” option to open the link in a new
window.
v) Working with Back, Forward button of the Browser: If you browse through several pages in
a window, you can move backward and forward by clicking the “Back” ( ) and “Forward” ( )
button in the standard toolbar. These two options will only back or forward one page at a time.
But, you can also select from the list of pages by placing the mouse pointer over the “Back”
button and then by clicking on the down arrow ( ) besides the button, and then clicking on any
site from the list of previously visited sites.
Clicking on the “Stop” button stops whatever the browser is doing, and will wait for your
next instruction. It is particularly useful for undoing mistakes.
b) Searching the Internet: Internet is a huge collection of information so it needs the search
query to be specific; otherwise, it will retrieve some irrelevant results. Searching means finding
or locating information through some search engines, directories, databases, etc. Generally all
searching tools provide you an option in the form of search box to conduct a search. The search
over Internet is interactive, provides post co-ordinate search facilities and produces more results
at a higher speed at a reduced cost.
Some of the well known search engines are Google (http://www.google.com), Bing
(http://www.bing.com), and Ask/Aj/Ask Jeeves (http://www.ask.com). Most search tools have a
similar structure. All will include in some form i) form for you to enter your keywords, ii) a
button which will begin your search, iii) links to help pages and advanced search tools, normally
located near the search form, iv) special features and options, and v) subject categories (most).
i) Keyword Search: This is most generally used over the web. In this technique, the document
available in the WWW is generally searched by using keywords in the search box of a search
engine; use of preposition, articles and such other words are avoided in this type of search. E.g.
searching for Mahatma Gandhi, India in Google (http://www.google.co.in). Results from this
method are often mixed and you may have to go through many results to find the site most useful
to you. For keyword based search, the search strategy may include identifying keywords by
breaking down the topic into key concepts.
ii) Phrase Search: When a user is quite aware of all the words that occur in the same sequence
in the relevant digital document, then he/she can use phrase (or proximity) search techniques. In
such cases the search terms were down the search results considerably. Surrounding a group of
words with double quotes tells the search engine to only retrieve documents in which those
words appear side-by-side; e.g. “God of Small Things”, “Five Laws of Library Science”, (Five
Laws of Library Science), etc.
iii) Wild Card / Truncation Search: When a user is aware only of some of the letters that are
contained in the keywords then he / she can use wild card search technique to retrieve all the
documents containing the words which again contain the particular letters stated by the user. In
wild card search techniques the known letters are followed by an asterisk “*” or sometimes by a
“?” mark. The asterisk or question mark may be given in the left, right or in both sides of the
known letters as the case or need may be; e.g. Cata*, to retrieve document containing the word
“cataloguing”, “cataloguer”, “catalogues”, etc. i.e the search engine will find all the words that
contain keying letters as prefix letter of a particular word. Wildcard features allow variations in
spelling or word forms.
iii) Boolean Search: Most of the search engines use and or and not as boolean search
query, some uses * , + and - for the same purpose. Eg: Five laws of library science * S. R.
Ranganathan, to retrieve all documents containing the words Five laws of library science and
S. R. Ranganathan . In most cases the Boolean operators and or and not are used to
connect the key concepts.
iv) Natural Language Search: Some search engine uses natural language search queries i.e the
user is free to use natural language query to retrieve the relevant result. The system will
automatically ignore the unnecessary words. This is true in http://www.altavista;
http://www.askjeevas.com, etc. Eg.: Who is the Prime Minister of India, to retrieve the name of
the Prime Minister of India or to retrieve thousands of pages not containing the word “Who”.
v) Complex Search: In this type, combinations of the above search techniques are used to
retrieve more relevant results. For example, one can combine phrase searching with implied
Boolean operator. E.g.: “Classified catalogue code” * “S. R. Ranganathan”.
vi) Field Search: A web page is composed of a number of fields, such as title, domain, host,
URL, and link. So, field searching is one of the most effective techniques for narrowing results
and getting the most relevant websites listed at the top of the result page.
vii) Meta Search: The content of search engines, indexes and databases generally vary. So, if the
same search query is typed into several search engines then it is likely to produce different
results. So, a user may often want to know to see the results from various search engines. In such
cases he/she can use the Meta search engine to get single input or query and to retrieve results
from different search engines. Some example of Meta search engines are http://www.search.com,
http://www.albany.net/allinone, etc.
viii) Database Searching: Searching the directory or database is entirely a new experience. One
can search the directory or databases by the specific entry point, which the particular directory or
database is using to search its records. In case of a database of books the access point can be the
title of the article/document/author/editor/accession no, etc. In the database searching, one can
also save his/her result in accordance to his/her requirement. Some common examples of
databases are http://www.sciencedirect.com, http://www.jstor.org, etc.
Internet
Internet: Information technology consists of different components like electronics, computer
hardware, software, and telecommunications. Integration and application of the above
technologies in information handling for efficient and effective information management is
termed as information technology. By using IT we can obtain, process, store, transmit and output
information in the form of voice, picture or text. A part of information technology is the
Internet. If one has heard anything about computers, then he/she would have certainly heard
about the Internet as well, as it is so popular that there is hardly any one who has not come across
the term.
Internet, a computer network, rather a network of networks, makes any information
available at the touch of a button. The importance of internet lies on the fact that it is like a
printing press of the technology era. It is like a huge central warehouse of data that can be
accessed by people from all over the world. The internet represents one of the most successful
examples of the benefits of sustained investment and commitment to research and development
of information infrastructure. The internet today is a widespread information infrastructure, the
initial prototype of what is often called the national (or global or galactic) information
infrastructure comprising more than thousands of regional, national and international networks
which connect people from all over the world.
Internet has brought about drastic changes in social contact and tries to by pass physical
face to face contact. Today, it is used daily by millions of people, who access it for a variety of
purpose. There has been practically no technology being adopted at a rate similar to the internet.
1. Definition: On October 24, 1995 the FNC unanimously passed a resolution defining the term
Internet. This definition was developed in consultation with the members of the internet and
intellectual property right communities. “The Federal Networking Council” (FNC) agrees that
the definition of the term “Internet” is reflect in the following expression: “Internet refers to the
global information system that
a) is logically linked together by a global unique address space based on the Internet Protocol
(IP) or its subsequent extension (follow-ons;
b) is able to support communication using the Transmission Control Protocol / Internet Protocol
(TCP/IP) Suits or its subsequent extension / follow-ons and / or other IP compatible protocol
and
c) provides uses or makes accessible either publicly or privately high level services layered on
the communication and related infrastructure, described here in http://www.fnc.got/internet-
res.html.”
In simple term, the internet is an enormous network of millions of computer allowing
constant communication throughout the world. It is a loose connection of related networks or a
network of networks. It is made up of Local Area Network (LAN), Metropolitan Area Network
(MAN) and huge Wide Area Network (WAN) of the whole world. It is a global information
highway and a universal database of knowledge which itself collectively represents human
society on a virtual life.
2. History: The first recorded description of the social interaction that could be enabled through
networking was a series of memos written by J. C. R. Licklider of MIT, USA in August 1962
discussing his “Galactic network” concept. He envisioned a globally interconnected set of
computers through which everyone could quickly access data and program from any site. The
internet began to evolve when packet switching network came into operation in the 1960s. In
Europe, when transmitted data is broken up into small packets and sent to its destination then the
reassembled packet can also be compressed for speed and encrypted (converted into code) for
security.
a) ARPANET: In 1968, a similar system as that of packet switching was developed in the USA.
In 1969, Pentagon Commissioned Advanced Research Projects Agency Network (ARPANET)
for research into networking. In the following year Vinton Cerf and others published their first
proposal for protocol that would allow computer to “talk” to each other. Thus, ARPANET began
operating using the Network Control Protocol (NCP). The first host to host protocol, which went
into operation at the US Defence Department’s Advanced Research Projects Agency (ARPA) in
1969-1982. In 1974, Vinton Cerf joined Bob Kahn to present their “protocol for packet network
interconnection” specifying the detailed design of Transmission Control Protocol (TCP), the
basis of the modern internet. In 1978, TCP was split into TCP (now short for Transmission
Control Protocol) an Internet Protocol (IP). When NCP was replaced by the new widespread
Transmission Control Protocol / Internet Protocol (TCP/IP), a number of interconnected US
military computers formed the first sizable internet for defence use (communication in the event
of nuclear attack).
b) National Science Foundation: Internet really took off in the year 1980s when the National
Science Foundation (NSF) used ARPANET to link its five regional super computer centres at
major universities so that many users could share their work. Later on NSF created National
Science Foundation Network (NSFNET), a series of networks for research and education
communication. It was provided free to any US research and educational institution.
c) USENET: Usenet is actually a companion network to electronic mail started at Duke
University and the University of North Carolina, USA and it also offers an unusual service called
“Network News”. Email was developed through ARPANET as did the Bulletin Board System
(Usenet). Usenet, which began in 1979 contributes enormously to the internet’s rapid expansion.
Its spirit of information sharing and discussion was the hallmark of its system and was reflected
in the Internet as a whole.
d) World Wide Web: By the end of 1980s the European Particle Research Laboratory (CERN)
in Geneva was one of the premier internet sites in Europe. CERN desperately needed a better
way of locating all the files, documents and other resources that now threatened to overwhelm it.
Tim Berners Lee, a young British scientist working as a consultant for CERN, had found out an
answer for the above problem. In 1991 his World Wide Web system assigned a common system
of written addresses and hypertext link to all information. In 1991, the first www files were made
available on the internet for downloading using File Transfer Protocol (FTP). In October, 1993
there were around 200 known HTTP servers. In 1993, the National Centre for Supercomputer
Application (NCSA) developed web browser (namely Mosaic) which took the internet by storm.
3. Components of Internet: The Internet consists of the WWW and all the hardware, software,
protocols on which WWW runs. One of the main characteristics of Internet is that it is a
decentralized system i.e there is no single person or organization that owns or control Internet, all
who use Internet or supply material to it, have a role to play. However, there are organizations
such as InterNIC, the National Science Foundation, the Internet Engineering Task Force, ICANN
and the Internet Architecture Board which oversee and standardize what happens on Internet.
a) World Wide Web: The WWW is also called web. The WWW is a set of programs, standards,
and protocols (set of rules) governing the way in which multimedia files (files containing a
combination of text, graphics, photographs, audio, video) are created and displayed on the
Internet. The difference between the Internet and the WWW is similar to the distinction between
a computer and a multimedia program that runs on the computer. The Internet is a decentralized
global network of computers that transfer information and the wiring that makes all these
possible, whereas the web is a collection of documents or websites, that users can access using
the Internet and a web browser.
b) Hardware: It means the computer (supercomputer, web server, and personal computer),
modem (external or internal) and cables or telecommunication lines. The cables with jacks and
rackets connect the modem with the computer and telephone. The users possess the terminal or
the computer, modem, etc. The ISP procures the server that serves up web pages upon request.
i) Modem: Modem is a device that allows computers to communicate over telephone lines, it
converts a digital signal to an analog signal and vice versa.
c) Software: It includes the operating system and web browser.
i) Operating System: In case of Operating System, Windows, Linux or others will do. The higher
versions of the OS are preferable because it has an inbuilt component to support internet
connections.
ii) Web Browser: A web browser is the software program that is used to access the WWW or to
visit web pages and display it in the computer screen, e.g. Internet Explorer, Google Chrome,
Netscape Navigator, etc.
iii) Telecommunication Lines: The telephone companies own the equipment and cables that
carry signals to the service providers.
d) Internet Protocol Suite: The Internet Protocol Suite [also known as Transmission Control
Protocol / Internet Protocol (TCP/IP)] is the set of communication protocols used for the Internet
and other similar networks. It governs the way data travels from one machine to another across a
network. It is named from two of the most important protocols in it: the Transmission Control
Protocol (TCP) and the Internet Protocol (IP), which are the first two networking protocols
defined in this standard.
The Internet Protocol Suite, like many protocol suites, may be viewed as a set of layers.
Each layer solves a set of problems involving the transmission of data, and provides a well-
defined service to the upper layer protocols based on using services from some lower layers.
Upper layers are logically closer to the user and deal with more abstract data, relying on lower
layer protocols to translate data into forms that can eventually be physically transmitted.
The Internet Protocol Suite consists of four layers. From the lowest to the highest, these
are the Link Layer, the Internet Layer, the Transport Layer, and the Application Layer.
In the application layer, the following are the common types of protocols
i) HTTP: Web pages are transferred between computers using Hyper Text Transfer Protocol.
ii) FTP: Excluding web pages other types of files are transferred between computers by using
FTP. It is a mechanism that allows placing and retrieving of files over the Internet. It allows
anyone to download software, upgrading of downloaded softwares, information and so on. It
provides authorization of persons allowed to copy the files.
iii) Telnet Protocol: It is a simple programme created by National Centre for Supercomputer
Application (NCSA) that uses TCP/IP to provide connection into another computer. Telnet
allows a users’ work station or terminal to behave as though it is directly connected to the
machines where the user is logged in. It means that Telnet helps to operate remote computers
from one’s own desktop. The condition is that the user must have log-in account and passwords
to access the remote computer.
iv) Gopher Protocol: The University of Minnesota Microcomputer work-station centre created
gopher to find information on the internet in a user friendly way. It is a menu-driven programme
that allows one to click with information server or “Gopher Holes” on the Internet to retrieve the
information including text, sound and images. The gopher system is impressive owing to its
simplicity volume and variety of information available. To retrieve information an indexing tool
called Veronica is used that searches all gopher server using a set of keywords.
e) Internet Service Provider (ISP): An Internet service provider is an organization that
provides some crucial portion of the Internet infrastructure to help connecting to the Internet.
Sometimes the Internet Service Provider also responsible for telecommunication link i.e
telephone connection to users’ site, or in today’s context Data Card providers and an internet
account (username and password). The ISP provides the Internet connection to the user.
f) The Website: The Hyper Text Mark Up Language (HTML) is the commonly used language
for creating the web documents or webpage. However it is not the single one. A website is a set
of related (linked through hypertext link) web pages, published by an organization or individual.
Normally it contains a home page along with other additional pages. The home page is the
starting point or doorway to a website providing an overview of what could be found at the
website. Home page is also known as the index page or index.
In Internet environment, the download refers to copying or saving the data, information
from the internet to the local computer. Uploading is just the opposite of downloading. It is the
sending of the data or information from the local computer to the Internet. The Online means
staying connected to the Internet. The offline is just the opposite. Offline means that the user is
no longer connected to a remote computer or the internet.
In Netscape Navigator, Bookmarks is a list of favourite web pages and Internet resources. One
can add items to this menu at any time. Bookmarks are equivalent to favourite in Microsoft
Internet Explorer.
4. Internet Protocol Address: An Internet Protocol (IP) address is a numerical label that is
assigned to devices participating in a computer network utilizing the Internet Protocol for
communication between its nodes. An IP address serves two principal functions in networking:
host or network interface identification and location addressing. The role of the IP address has
also been characterized as a name that indicates what we seek. An address indicates where it is. A
route indicates how to get there.
The network portion of the IP address is allocated to the Internet Service Providers (ISP)
by the InterNic under authority of the Internet Assigned Number Authority (IANA). ISPs then
assign the host portion of the IP address to the machines on the network that they operate.
a) Uniform Resource Locator (URL): The location of a web page on the internet can be
identified by a unique address which is called URL. Every single page of the hundreds of
millions of pages stored on the web has a URL. The URL or the address tells the browser which
document to fetch and exactly where to find it on a particular host computer some where on the
internet.
b) Domain Naming System (DNS): The Internet uses an addressing scheme that employs the
Domain Naming System (DNS). Domain names provided a system, an easy to remember internet
address which can be translated by the Domain Names System (DNS) into the numeric address
(Internet Protocol Number). The internet protocol number is the numeric location of a particular
computer so that it is an identifiable machine to all the other computers connected to the internet.
The IP address is a 32 bit number divided into four octets and these octets are written in dotted
decimal format eg. 11.245.196.212. Each octets numbers lie in between o and 255.
c) Internet Address: The Internet address is needed so that massage can be correctly routed to
and from the machine over the network. Each part of the address goes from general to specific
and consists of letters, numbers, and punctuation. The basic structure of URL is hierarchical. i.e
Protocol:// Server name. Domain name. Top level domain name. port / Directory / File name.
Eg: http://www.liswiki.com/wiki/index
Protocol: The protocol is generally Hyper Text Transfer Protocol (HTTP).
://: It is a kind of separator that tells the browser that the next words will be actual URL.
Server: WWW. It indicates the site as part of the World Wide Web. The web is a subnet of
Internet that uses multimedia objects.
Domain Name: Liswiki is the domain name. This is a unique name which has to be registered
with InterNIC, an organization which has official authority over all domain names.
Top Level Domain Name: It indicates the purpose of the institute / organization associated with
the website. Some of the top level domains are-
Organizational Domain
.com: Commercial entities;
.edu: Educational institutions;
.gov: US government institutions;
.int: International institutions;
.mil: US Military institutions;
.net: Network resource providers;
.org: Non profit organization.
Geographic Domain: Outside the United States a code is included to which country a URL
belongs. Though United States also have a domain code (US) yet in reality it is used in rare
instances on the Internet. It is assumed that if there is no geographic code then the domain is
located within the United States.
For example:
.au: Australia;
.ca: Canada;
.in: India;
.va: Vatican, etc.
Directory: The next is the directory on the host computer that contains the specific website.
5. Types of Internet Connections: The type of internet connection requirement depends on its
uses. If the user wants an Internet mainly for sending e-mail, occasional chats, infrequent
browsing then he should go for a dial-up connection. If the user is using the internet frequently
for research, downloading or uploading a fair amount of data, play multi-player video games or
live audio or video streaming, then he should look into other high speed accesses such as a cable
modem or ISDN. The Internet connection generally can be categorized into the following-
i) Dial-up (analog up to 56k): In a Dial-up, the telephone lines are used to connect to the
Internet. Here to get connected, the user needs to specify a username, a password, and a
telephone number.
ii) Digital Subscriber Line (DSL): DSL operates over normal telephone lines and it can be used
simultaneously with the telephone. It can increase the connection speed by ten times from a
standard dial-up modem.
iii) Integrated Services Digital Network (ISDN): ISDN involves the digitization of the
telephone network so that voice, graphics, text, and other data can be provided to users from a
single terminal over existing telephone wiring. It is four times faster than a Dial-up network.
iv) Cable Internet: A cable modem connects the user to the Internet through a cable television
line. A cable modem will typically have two connections, one to the television outlet and the
other to the computer. It is 10-100 times faster compared to the dial-up modem and added
interactivity to the television.
v) Leased Line: Leased line facility is provided via fiber optic or copper lines to provide data,
voice and video links between two parties. It provides for a consistent amount of bandwidth. For
example, T-1 Lines, T-3 Lines, etc. It is especially useful for businesses connecting to the
Internet and for Internet Service Providers (ISPs) connecting to the Internet backbone.
vi) Internet over Satellite (IoS): Here the data are transmitted via satellite to a dish antenna at
the users’ house. It allows a user to access the Internet via a satellite that orbits the earth. A
satellite is placed at a static point above the earth's surface in a fixed position. Because of the
enormous distances signals must travel from the earth up to the satellite and back again. IoS is
slightly slower than high-speed terrestrial connections over copper or fiber optic cables.
vii) Wireless Internet Connections: Wireless Internet or wireless broadband is one of the
newest Internet connection types. Instead of using telephone or cable networks for your Internet
connection, one can use radio frequency bands. Wireless Internet provides an always-on
connection which can be accessed from anywhere- as long as one is geographically within a
network coverage area. It is typically more expensive and mainly available in metropolitan areas.
Broadband is often called "high-speed" access to the Internet, because it usually has a
high rate of data transmission. In general, any connection to the customer of 256 kbit/s (0.256
Mbit/s) or greater is more concisely considered broadband Internet access. The standard
broadband technologies in most areas are DSL and cable modems. Newer technologies in use
include pushing optical fiber connections closer to the subscriber in both telephone and cable
plants.
Modems which use mobile phone lines [General packet radio service (GPRS), Universal
Mobile Telecommunications System (UMTS), Wired Interoperability for Microwave Access
(WiMax), etc.], are known as cellular modems. Cellular modems can be embedded inside a
laptop or an appliance, or they can be external to it to access the Internet. External cellular
modems are datacards and cellular routers. The datacard is a PC card or ExpressCard which
slides into a Personal Computer Memory Card International Association (PCMCIA)/PC
card/ExpressCard slot on a computer.
6. Factors Affecting Speed of Internet Connectivity: The speed of internet connectivity is
influenced by the following factors-
a) Speed of the Modem: The speed of the modem greatly influences the speed of internet
connectivity So, for getting higher speed one must procure a modem with a maximum speed of
56kbps or higher, if possible.
b) Quality of Phone Line: Noise on the phone line, running into the home, can disrupt internet
connection with a modem. So, higher quality phone line should be used. If possible, ISDN
should be implemented to solve the problem.
c) Internet Traffic: While hitting a popular site, one may be competing with the hundreds or
thousands of others for the attention of that site server resulting in slow speed of access. The web
traffic generally tends to expand throughout the day and peaks around the evening. So, for
getting high speed one should try to change the time of the day he/ she is going for online.
d) Personal Computer: There are some other factors which are associated with personal
computer. They are-
i) Processor: For getting higher speed one should procure processors which have 650 MHZ or
higher speed.
ii) RAM: Working with other software application at the time of browsing decreases the RAM
capacity resulting in slow speed of access to the Internet. So, it is better to get higher RAM or
avoid working with other software application while surfing.
iii) Hard Disc: A highly fragmented hard disc can slow down web surfing considerably. So, it is
good to practice to keep the hard drive defragmented and optimized.
iv) Browser’s Cache: Web browser’s cache is a storage area on the computer’s hard disc. As one
surfs the browser stores the web pages that are already visited in the cache up to the disc space
limit that one has set. When anyone tries to retrieve the same page after its first visit the browser
displays the cached WebPages from the hard disc which is very fast and not from the Internet.
So, if cache memory is small it slows down the access to the Internet. The solution is to increase
the browser cache limit.
v) Image Loading: Today many files are very big and rich of data, picture, image, etc. and so it
takes longer time to download the images resulting in slow speed to Internet access. One can
solve the problem by turning off image loading and java in the browser without affecting the
content of a webpage. This can be done by selecting advanced Tab of Internet options in the Tool
menu.
vi) Working with Two or More Browser Windows at a Time: To increase further surfing
speed one can surf with two or more browser tabs or windows at a time. This will enable one to
read the content of one page while allowing another page to load in the second windows. This
may help to cut down the time lag and frustration.
7. Internet Applications: Internet is the network of networks. It provides a base structure for
different applications / services. Such applications may include Email, chat, discussion group,
discussion forum, social network and so on. Almost every protocol type available on the Internet
is accessible on the web. There are many activities that can be preformed online. Some of the
commonly used applications are only listed here in the following paragraphs;
i) World Wide Web: It is a subset of Internet and it presents text, images, animation, video,
sound, and other multimedia in a single interface. The operation of the web relies primarily on
hypertext, as it is a means of information retrieval. Hypertext is a document containing words
that connect to other documents and resources throughout the Internet.
ii) Email: Electronic mail or e-mail is a fast, easy, and inexpensive way to communicate with
other internet users around the world. Email can be defined as the process of exchanging
messages electronically, through a communication network, using the computer. Using email,
one can exchange messages with someone else on the internet. It reaches its addresses within
seconds and the people at large using it. Email overcomes most of the problems and delays of
getting a physical document from one person. It is one of the basic and earliest services of the
Internet and the most used application on the Internet too.
iii) File Transfer Protocol (FTP): It is a system of rules and a software program that enables a
user to log on to another computer and transfer information between it and his/her computer. FTP
can be done using the command prompt, browsers, and various GUI based FTP softwares such as
CuteFTP and WS_FTP.
iv) Telnet: It allows a user to log on to a remote computer in such a way that a person may
interact with another machine as if it is being used locally. The user’s monitor displays what is
taking place on the remote computer during the telnet session.
v) Chat: Chat puts people online in a live conversation with other internet users around the
globe. Chat programs allow the users on the Internet to communicate with each other by typing
in real time. It is sometimes included as a feature of a website.
vi) Internet Telephony: Internet telephony is the use of Internet to exchange spoken or other
telephonic information. The required hardware for Internet telephony generally consists of end
devices (either traditional telephone or audio-equipped personal computers) and gatekeepers that
provide call admission control, bandwidth management, addresses translation, authentication,
and user location. There are many Internet telephony applications available, for example
CoolTalk, NetMetting, etc.
vii) Video Conferencing: It enables direct face-to-face communication across networks using
audio, video, and the data. In video conferencing, web cameras, microphone, and other
communication tools are necessary.
ix) E-Commerce: E-commerce refers to buying and selling goods and services online.
x) Mobile Commerce: M-commerce or mobile commerce refers to transactions through a mobile
phone network and data connection that results in the transfer of value (monetary or otherwise)
in exchange for goods and services.
xi) Mailing List (Listserver): It is a method of sending and receiving discussions via e-mail,
organized around some topics within a large community.
A search page is a web page where a search of the web can be conducted. If some one is
good at framing the search queries, it will help them in finding exactly what they are looking for,
anywhere on the web. The web directories provide direction to the web sites by listing relevant
web pages in some easy to browse categories. Many web directories also provide search facilities
to the user for easy location of the pages. Web directories are especially useful when someone is
new to some topic.
Groups and discussion forums are great ways to keep up with a subject. It broadens one’s
mind by displaying different points of view or perception on a single idea or concept. The social
network is the virtual social life of the people over the web.
Advantages and Disadvantage of Internet: The internet has the following advantages-
i) Central Repository of Information: The Internet is like a huge central warehouse of data that
can be accessed by people from all over the world.
ii) Direct Communication: Through email, chat, internet telephony, video conferencing, etc.
one can directly communicate with others.
iii) Round the Clock Availability: Information on the internet is available to the user 24 hours a
day and 365 days of the year.
iv) Cheapest Medium: Internet is perhaps the cheapest medium for online help, trouble shooting
assistance, for getting specific information, etc.
v) Distance Learning: It provides the facility of learning remotely without physically coming in
contact with the teacher, the school or university.
vi) No Barrier: In the internet environment any one can be author / writer / publisher and users
of the information. There is no barrier in this regard.
The disadvantages of Internet can be as follows-
i) Copyright: Digitization violates the copyright laws as the thought content of one author can
be freely transferred to another without his acknowledgement.
ii) Incompatible Hardware and Software: The hardware and software are modified every day.
So a document that is available in one format may not be accessible in the days to come. So, one
has to upgrade the hardware and software configuration as and when needed.
iii) Artificial Environment: The environment created by Internet is an artificial one.
iv) Volatile Information: The electronic environment though very exciting and stimulating is
also quite volatile.
Let Us Sum Up: Internet is the largest of all other networks connecting a large number of
smaller interconnected networks, so it is a computer based worldwide network connecting other
smaller networks. It is a global network linking millions of computers and people cutting across
all barriers and boundaries of countries, race, class or sex. Internet can also be described as a
collection of government, academic, commercial and individual sites.
The launching of ARPA in 1957 by Sputnik, and European Particle Research Laboratory
(CERN) are at the backend in the development of the Internet. The Internet mainly consists of
the WWW and all the hardware, software, and protocols. To get connected to the internet, the
user will need a computer, a modem (internal / external), and an Internet account with the ISP.
The usefulness of Internet lies in its characteristics of the Worlds Greatest Library where
everybody will find it as a vast pool of information; it is the Wide Area Network, and much
more. Besides, it also provides the latest information on any topic available round the clock and
from a wide distance.
Terms
1. Definition: William J. Martin defined information society as “a society in which the quality of
life as well as prospects for social change and economic development depends increasingly on
information and its exploitation”. In such a society, living standards, patterns of work and
leisure, the education system and the market place are all influenced markedly by advances in
information and knowledge. This is evidenced by an increasing array of information intensive
products and services that communicate through a wide range of media, many of them being
electronic in nature.
According to Blaise Cronin, “an information society is one in which labour has been
intellectualized, one in which the expression to earn one’s daily bread by the sweat of one’s brow
sounds decidedly anachronistic”. Employment in the information sector of the economy is
growing fast. Soon, terms such as information worker, knowledge engineer, ideas processor will
be as common as weaver, miller, electrician, carpenter, etc.
G. P. Sweeney defined information society as one “in which the creation of economic
wealth is based on information and in which key economic activities are enquiring,
communicating and deciding” for good or ill. Martin is of the view that “the concept of an
information society has now gained a fair degree of acceptance”. As a concept it is certainly
viable.
2. Criteria of an Information Society: William J. Martin has noted the following criteria for
the development of information society.
a) Technological Criteria: Today’s age is the computer age in which computers and
telecommunication are behind every other change in the society. Communication technologies
such as teleeducation, teleconferencing, teleshopping, telecommuting, e-government, e-
commerce have converted the world into a global village and its impact can be felt at every level
of our society.
b) Economic Criteria: This is the age of knowledge in which knowledge capital would
predominate over material capital. The internet is fundamentally changing the way the
companies operate. The internet is turning the business upside down and inside out. The e-
commerce goes far beyond the buying and selling over the internet. The information workers are
replacing productive worker as the biggest sector in the economy. Information is turning out as
the key economic factor as resource, service, commodity, a source of added value and
employment. In the information society most of the information will be cheaper, would occupy
less space and can be communicated with greater speed.
c) Social Criteria: In information society, information is the enhancer of the quality of life. The
information society will be conscious towards the value of information and its use and will
become increasingly centred on information handling, processing, storage and dissemination
using micro electronic based technologies. Globally the society has got divided into two parts,
i.e information rich society and information poor society.
d) Political Criteria: In information society there would be more interaction between the
government and the governed through citizens’ participation by way of electronic polling, their
access to public information under the concept of freedom and equality of access to information.
There will be better interaction with fellow citizens through wired networks, telephone,
teleconferencing, etc. The information superhighway will change the whole world.
e) Cultural Criteria: The information society recognizes the cultural value of information
through the promotion of information values in the interest of national or individual
development.
In an information society, it is said, a majority of the people will spend their time doing
tasks which relate to information, expressing, gathering, storing, retrieving and disseminating it.
People in an information society will manipulate information for the purposes of travel,
entertainment, instruction, control and so on.
Information Need
Information Need: The information needs; demands and wants have been used interchangeably,
although they may not be identical. Information need involves a cognitive process which may
operate on different levels of consciousness and, hence, may not be clear even to the inquirer
himself / herself.
People in different situations require information on a subject in different forms and with
different emphasis and different depth of explanation. Even the same person seeks information
in different ways and forms on various occasions depending on his/her knowledge of the subject
and the reasons for wanting the information. So the information need is very difficult to define
and categorize.
a) Definition: Information need is seen as a subjective, relative concept existing only in the
mind of the experiencing individual. The Librarian’s Thesaurus defined information need as
“that need which library science and material are intended to satisfy”.
Maurice B. Line has defined information need as “what an individual ought to have for
his works, his research, his education, his recreation, etc”.
According to Brenda Dervin, “an information need is an impediment preventing an
individual from moving forward in cognitive time and space. The person is faced with a gap that
must be brought by “asking question, creating ideas and for obtaining resources. Such gaps do
not occur in the abstract but arise out of a particular critical event and situation”.
Faibisoff and Ely (1976) viewed information need as either shaped by activity such as
problem solving or decision making or manifest through a passive reception of information
which is stored as knowledge.
Krikelas (1983) has defined it as the “recognition of the existence of uncertainty”. While,
N. Ford in 1983 defined it as “recognition of the existence of uncertainty and described it as
something which prevents an individual from making progress in a difficult situation”.
b) Types: Information is a power and so it is needed in virtually every field of human thought
and action and by everyone for some purpose or the other. According to Carol C. Kuhlthou
(1991) in the process of information searching, initially a person first becomes aware of
knowledge or understanding, feeling of uncertainty and apprehension. This is the stage showing
the need for information. Information need generally varies from individual to individual,
according to their working condition, the discipline in which they are working, the time, etc.
Tague has presented the following types of information needs-
i) Social or Pragmative Information Need: Required to cope with day to day life;
ii) Recreational information need;
iii) Professional information need;
iv) Educational information need.
Krikelas on the basis of information seeking behavior, categorized information need as
i) Immediate Need;
ii) Deferred Need.
David Bawden (1986) identifies four kinds of information in particular for aiding the
creative process. They are-
i) Interdisciplinary information;
ii) Peripheral information;
iii) Exceptions and inconsistencies.
Melvin J. Voigt’s (1961) study revealed that the same person could interact with the
information system in different ways at different times depending upon his purpose in relation to
his works, stage of his works, general interest, amount of information already available to him
and so on. According to him, a scientist’s use of information arises from three different needs.
These are -
i) Current Approach: The need to know what other scientists have recently done or are doing. It
keeps up to date with the current progress of a scientist’s field.
ii) Everyday Approach: The needs that come to the scientist in course of his work for some
specific piece of information. This need is directly connected with the research work or the
problem at hand.
iii) Exhaustive Approach: The need to find and check through all the relevant information
existing on a given subject.
Later a fourth type of information need was added to the Voigt’s types of information
need by other workers in the same field.
iv) Catching up or Brushing up Approach: A worker may at times need to have a brief but a
complete picture of the recent development of a related subject in which he was not very much
interested or which did not come within the area of his main interest. In such cases he needs a
catching up approach.
The need of the scientist at different levels makes him adopt different approaches to
gather the requited information.
Information needs also can be categorised as follows:
i) Information for its Own Sake: Information for its own sake are to live in this world in order to
know the world and our surrounding environment. Therefore, no action is necessarily taken on
this type of information.
ii) Professional Need: Information is needed to meet the professional need, to cope up and
compete with other professionals in the subject. Professionals such as doctors, lawyers,
librarians and others need information to pursue their vocations. They cannot afford to ignore
new development in their respective fields. Their ignorance about the latest development in the
field would affect their performance. Engineers, technologists, business executives need
information for solving the problems related to their respective profession.
Information Explosion
Information Explosion: There has been a continuous revolution in the generation, transfer and
communication of information since the invention of printing. Though information generation is
a continuous process yet the two World Wars had a very great impact on the very fast
development of various fields of knowledge. Since the 2nd World War information, in fact, has
been growing at an exponential rate and it is often referred to as “information explosion”.
According to American Educational Association, it had to wait till 1750 since the
beginning of the Christian era for human knowledge to double. The second doubling was
completed 150 years later in 1900. The third doubling of all man’s knowledge took place in the
decade of 1950s, but today it is even growing at a faster speed. Let us now discuss information
explosion in terms of its definition, factors for information explosion, its impact and how it can
be controlled. The following sections deal with these aspects-
a) Definition: The term “information explosion” attempts to describe the exponential increase
and diversification of published data and information. “Exponential” is a technical term meaning
produced or expressed by multiplying a set of quantities by themselves. The exponent is the sign
written above to the right of the number or letter in mathematics to show how many times that
quantity is to be multiplied. For example, in 53, the number 3 is the exponent. In ym the letter
“m” is the exponent. The explosion image conveys the idea of sudden bursting out.
b) Factors that Lead to Information Explosion: There are many factors which directly
contribute to information explosion. Some of them are -
i) Increased Literacy: Creative contributions are born when a man or woman comes in contact
with the light of education. Increased literacy is a prime factor for information explosion because
individuals produce new information as he becomes more and more acquainted with knowledge.
ii) Increased Number of Scholars: The art of creativity is confined relatively to a very small
proportion of the world’s population, who could devise new methods, recognize the existing
ideas and offer improved solutions to familiar problems. They set new standards in science and
technology, literature, fine arts, business, industry and social leadership. When the society
becomes devoid of nature’s gift of talents then it would begin to stagnate and will ultimately
perish. In 1800, there were 1,000 scientists and engineers in the world which increased to 10,000
in 1850 and in 1900, to 100,000. In 1950s, the numbers swelled to one million. It is this ever
increasing number of scientists that accounts for the rapid proliferation of published materials.
iii) Increased Research and Development: The increase in research activities is also one of the
factors of the exponential growth of information. Nowadays the scale and level of research
funding have changed significantly as the research has become mission-oriented,
multidisciplinary and assumed a matrix managed character.
iv) Increased Literature: Literature of a subject is its foundation. It represents a record of
achievements of the human race. Literature is diverse, complex and multilingual in nature. It is
becoming more and more interdisciplinary. It is growing at a fast pace. In science, it is almost
doubling itself in every 5.5 years. In social sciences it is doubling at the rate of every eight to
twelve years and in the documentary media book production more than double in a decade.
According to Rider, American libraries which try to collect everything appearing on a given
subject double their size in every 16 years.
v) Origin of Different Types of Information Sources: Earlier information sources are only
published media and handwritten manuscripts but today the sources of information are
diversified from databases, microforms, online journals, CDROM, DVD, optical disk to
hypermedia and hypertext.
vi) Growth of Technology: Technology has multiplied by 10 times every 50 years for over 2800
years but now a days its growth is very fast. Advancement in the field of communication and
technology network has brought down the distances between the person, states, countries and
continents throughout the world, Computer and telecommunication are converging very rapidly
and its highest impact is felt fall in the information sector. Actually the need for creative
achievement has never been more recognized and designed than it is today.
vii) Development of Society: Information has been stored in people’s mind and it has been
updated and modified through social contact and communication. As society has developed and
become more complex large quantities of information have been generated, published and
disseminated causing an information explosion.
viii) Development of Competition: We will continue to be confronted with competitive forces
leading to creation as long as one person strives to advance, as long as one business attempts to
increase its share of the total industrial output or to improve its profitability as long as one nation
attempts to improve its position in the world. The competitive forces are leading to the demand
for more information. As a result, more and more information is produced.
c) Impact of Information Explosion: The impact of Information Explosion can be summarized
as follows-
Due to the explosion of information
i) It has become difficult to keep pace with the proliferation of published materials.
ii) It creates a great problem in management of information.
iii) It is becoming difficult to locate & pull out specific information.
iv) It is tremendously contributing towards duplication of information generation. In UK, the
estimated cost of unintended duplication in scientific research in the 1960s was Rs. 21.6 million.
v) It creates a great problem in bibliographic control.
d) Controlling Information Explosion: The terrific rate of expanding of knowledge and
information can not be slowed down. So, the control of information explosion does not mean the
controlling of growth and development of information; rather, it means the development and
maintenance of a system of adequate recording, and storing of all forms of information
published and unpublished, printed and non printed that add to the sum of human knowledge.
So, actually, the control of information explosion means the mastery over information
generation.
The need to be aware of different information sources arises from the fact that even a
voracious reader is unable to read all the literature on his/her chosen subject. The
interdisciplinary nature of subject and the wide variety of their characteristics have added to the
confusion. But, for any scholar, it is very essential to keep pace with the all information that is
coming day by day in his/her field of specialization.
The design and development of different information system can be a probable measure
of keeping an eye on the information explosion. It should be equipped with the necessary
databases, indexing and abstracting services. The librarians also have to devise some sort of
information service, which may result in bringing out a product which analyses, consolidates,
evaluates & disseminates all the latest information.
New ideas are generated in each and every branch of human activity from time to time.
Apart from new ideas, we give new interpretation to known ideas; we also borrow ideas from
other disciplines and try to apply them in a new context. As a result, more and more information
is produced in a variety of forms leading to information explosion.
Information as a Resource / Commodity
Information as a Resource / Commodity: The concept of information as commodity is wider
than that of information as resource, as it incorporates the exchanges of information among the
people and related activities as well as its use. The notion of information as a commodity is tied
closely to the concept of value chains. With commoditized information gaining in value as it
progresses through the various steps of creating, processing, storage, distribution, and use.
a) Information is a Resource / Commodity: Information possesses many characteristics that
are the same as those of some other commodities. When we consider such characteristics,
information can be termed as a resource and a commodity in a broad sense and people at large
have accepted this view.
i) Information is a Natural Resource: Many resources were earlier taken for granted as
common for all. For example, clean air and water. Information has also been similarly
understood. Whoever is interested can get enough information for his daily needs through
institutions established for that purpose. But specialized information is made accessible to those
who have special needs and can legitimize its claim by status or by money. Just like the
maintenance of clean air and water, the proper information demands some cost.
ii) Information is a Vital Resource: Information is looked upon as a resource like manpower,
material and money. Information is a resource created by ingenuity of man to be used by man for
the benefit of man; it can be used for the opposite also. According to K. J. McGarry, information
becomes a resource by analogy with the classic resources of labour, capital and material.
Management of these classic resources (man, material and money) now mutates to the
“management of information”. It is easy to see how information can be depicted as a resource as
essential to productive success as are raw materials and skilled staff. But information needs to be
controlled, manipulated and managed.
According to W. L. Saunders, information is that type of resource which is not scarce. It
has also economic value as when company uses the information effectively, the level of trade and
revenue are maximized. Information and knowledge become the principal generators of wealth
in the form of educational institutions of research and development establishment and science
laboratories.
No national development programme can succeed fully without proper information
support. As such, it is regarded as a national resource like energy, coal, water, etc. vital for
national development. It is an important input for nation building. The impact of fast, reliable
and inexpensive information would be as great as that of electricity in national and international
economy. IBM, the giant computer company, says that information is like an inexhaustible and
renewable source of energy.
iii) Information is a Major Criterion: Information is vital for national development. The
backwardness or forwardness of any county nowadays is mainly due to the use of adequate
information, especially in the field of science and technology. Presently the world is divided on
economic consideration into economically developed and economically developing countries.
According to Herbert I. Schiller, in future the division will be based on possession of information
into information rich or data rich nations and information poor or data poor nations.
iv) Information as a Thing: Buckland points out that in order to communicate knowledge it
must be expressed or represented in some physical way as a signal, text or communication. Any
such expression would, therefore, constitute information as a thing. The notion of information as
resource attracts information economics and spreads to such diverse disciplines like
management, transport and communication, consolidation and repackaging, pricing, marketing,
distribution, exchange, etc.
v) Satisfies the Economic Principle: Information satisfies the economic principles of generation
or gathering, processing, storage, dissemination, etc.
* Demand / Market: Information has a wider market. All people need information for some
purpose or the other. There is a heavy demand for information from all around the world, so to
get profit out of it, its production rate must increase.
* Information Generation: Information is generated mainly through research activities and
research activities are highly price consuming business, which is just like other product whose
production or manufacture involves a high cost.
* Protection: Information as a resource has been well established which is evident from the
profusion of national and international laws and policies relating to storage, transmission and
information related services including trans-border data flow. Just as in the case of various
commodities or products, information is also protected by copyright and patent. However, the
property right of information is weaker than the property rights of other goods we possess.
* Consumption: Information does not always flow across market. Within some private sectors
information produced is entirely consumed within the organization itself, which is in the same
line of other goods.
* Different Forms of Products: For the different categories of users, different forms of
information are released into the market. In this regard it is just like any other services provided
in the market place. Information is provided through books, magazines, business, news,
investment, advice, legal advice, medical advice, consulting services, formal education through
school, colleges and universities, etc. So, we do have markets for information and people buy it
depending on its perceived value. In this respect information is like other goods and services.
* Transportation / Communication: High cost is involved when we use the information
technology for communication and transportation of information just like any other product.
* Storage: If information is stored for a long period just like other consumable products it loses
its value because particularly in case of science and technology, historical information is
generally less valuable.
b) Information is not a Resource / Commodity: Judith Jordet complains about the notion that
information is a commodity. According to him, this notion will not only interfere with real
knowledge creation, it will unravel what knowledge we have! When information is seen as a
commodity, the users are seen as customers consuming a commodity identified as information.
Users define usefulness. If it is not used, it is not useful. But in reality, how many users use all
the information that are the product of large research investment, is itself a question. Again,
against the view of information as a resource / commodity, the following arguments can be
offered-
i) Shareable and not Exchangeable (Public Good): Most of the goods and services have the
property that more for you means less for me; but in case of information, more for you does not
mean less for me. Passing of information is not losing it.
ii) Assigning Value: It is very difficult to assign values to ideas because different people need
information in different depth.
iii) Tax: Tax is not levied on information generation or its consumption; so it is not a commodity.
iv) Publicity: Before buying any other product or goods people know ahead of time what they
are going to buy, but in case of information one will not be able to know the whole thing before
buying it. If one knows the whole thing, then they may not feel the need to buy it.
v) Expandable and Compressible: Information increases with use, it can be expanded and
compressed i.e it can be summarized, integrated, etc.
vi) Non Materiality Problem: The non-materiality of information creates several problems in
respect of measurement, appropriateness, ownership, impact, costing, etc.
Information does not possess each and every property of other general resources or
commodities but at the same time we also should not expect it to be. The people at large are
favouring the view that information is a resource and a commodity.
INFormation and LIBrary NETwork (INFLIBNET)
INFormation and LIBrary NETwork (INFLIBNET): In April 1988, the University Grant
Commission (UGC) constituted a committee under the chairmanship of Prof. Yash Pal, to work
out the details of a university information library networking system. The report of this working
group was published in December 1988 containing a project proposal for the establishment and
development of an information and library network. Finally, in April 1991, INFLIBNET was
initiated by the UGC. It can be defined as a computer communication network of libraries and
information centres of universities, institutions of national importance, Research and
Development Institutions, bibliographical information centres, etc, thereby improving the
capability in information handling and services.
a) Objectives: INFLIBNET Centre is an Autonomous Inter-University Centre (IUC) of
University Grants Commission (UGC) involved in creating infrastructure for the sharing of
library and information resources and services among the academic and research institutions.
b) Organization: The organization of INFLIBNET can be viewed from the following angles-
i) National Centre: One national centre at Ahemdabad.
ii) Regional Centre: 4 Regional centre located in four geographical region of the country. They
are -
- North: Jawaharlal Nehru University, New Delhi.
- South: Indian Institute of Science, Bangalore.
- East: Jadavpur University, Kolkata.
- West: University of Poona, Pune.
iii) Sectoral Centre: These are means for bibliographic and information services. About 40
Sectoral Information Centre (S.I.C.) will be set up in due course.
iv) Document Resource Centre (DRC): About 100 library / Information centres will be deigned
as Document Resource centre. They will provide Document Delivery Service and they will be
identified based on their collection strength.
Each regional centre will maintain the copies of union catalogue of other regions so that
Union Catalogue enquires relating to the whole country holding can be solved at the regional
centre itself. The terminal of the college / department library is to be connected to the University
library, the terminal of the University library is to be connected to the Regional centre, sectoral
centre and D.R. Centers.
c) Resources: The main resources of INFLIBNET are.
i) University catalogue: The catalogue of document, periodicals, thesis forms major part of
INFLIBNET resources.
ii) Research & Development Library Catalogue: The collection of NISCAIR and NASSDOC.
iii) National Library: The computerized catalogue of the National Library of Kolkata.
iv) Indigenous Databases: The databases of discipline oriented information centre such as
Machine tools, Food technology, Leather technology, Drugs, Aeronautics are considered as input
to the INFLIBNET resources.
d) Functions and Activities: The main functions and activities of INFLIBNET are-
i) SOUL Software: INFLIBNET has developed library management software known as SOUL.
It is associated with its training, installation and up-gradation. Under Prime Minister’s special
package to NE India, SOUL packages are given free of cost to those libraries which are under 2F
or 12B of UGC. Delivery of SOUL package is done through the UGC Regional office. The
SOUL 2.0 was launched in 2009.
ii) Institutional Repository: INFLIBNET Centre develops a digital repository using DSpace
software. It hosts INFLIBNET’s Press and Media related documents, INFLIBNET's Annual
Reports, INFLIBNET's Convention Proceedings, INFLIBNET's Special Seminar, etc.
iii) Electronic Submission of Theses and Dissertations (ETD): It is a joint venture of UGC,
INFLIBNET takes an active role in making it mandatory to submit the electronic copy of a thesis
whenever the research scholars submit their thesis to the respective university or institutions for
the PhD degree.
iv) IndCat: Online Union Catalogue of Indian Universities: It is unified Online Library
Catalogues of books, theses and journals available in major university libraries in India.
v) CCF to MARC Conversion Utility: INFLIBNET launched an open source utility primarily
focused on libraries, where one needs to convert CCF data to MARC21 format. Development of
tool has been done with VB.Net 2005 with Framework 2.0. It can be found in
<http://sourceforge.net/projects/ccftomarcconver/>
vi) Standardization: MARC – II has been accepted as bibliographic standard for data capturing.
vii) Seminars, Conferences, Workshops and Training: INFLIBNET is regularly conducting
Convention on Automation of Libraries in Education and Research Institutions (CALIBER) and
Promotion of Library Automation and Networking in North Eastern Region (PLANNER) every
year. From 2009, the authority of INFLIBNET has decided to hold CALIBER and PLANNER
every alternate year. Besides, it also conducts INFLIBNET Regional Training Programme on
Library Automation (IRTPLA) and Attachment Training Programme for Practicing Librarians
and Computer Professionals of North Eastern Region.
viii) Mailing Lists and Forum: As on November, 2009 INFLIBNET is maintaining four online
mailing lists besides its “INFLIBNET Centre Blog” <http://www.inflibnet.ac.in/blog/> that
provides news and announcement related to the INFLIBNET.
INFLIBNET is a cooperative venture. So its resource strength depends on its participants.
The development of SOUL is likely to give more revenue to INFLIBNET and provide
justification for more and more libraries to join it. As a resource, it is hoped that INFLIBNET
will grow faster as a service based library network in India. The INFLIBNET Library plays a
vital role in the collection development and dissemination of scientific and technical information
to meet the present and future needs of the Centre.
Induction, Orientation and Placement
Induction, Orientation and Placement: Induction means introducing a new worker to his job,
his co-workers and basic objectives and policies of the organization. This kind of initiation is
helpful for an employee in settling himself to his new job. This can be achieved by supplying the
new employee all relevant information about his job and the organization through printed /
written document (staff manual) and verbal explanation by his immediate superior / supervisor.
The induction and orientation programmes are meant for any person at any level while
appointed because the newly appointed persons are not expected to perform the jobs with much
efficiency. They must get acclimatized to new work environment of the library.
a) Purpose of Induction and Orientation Programme: The purpose of induction and
orientation programme is-
i) To be acquainted with the objective, function, general policies and services of the library.
ii) To create a sense of belonging to the institution.
iii) To gain confidence in the particular department in which he /she shall have to work.
iv) To gain acclimatized or confidence in the new work environment.
v) To understand his/her own responsibilities.
vi) To motivate them to give their best.
The above purposes are achieved by a well designed orientation programme. First of all
the new comers have been provided information in general about the library and the parent
institution, the objectives, goals, functions and activities of the library. They should know rules
and regulations of the library, manner of working in the library. They should also know the
organizational chart and hierarchy order of management, their respective duties and
responsibilities and their specific rules in the work situation. The programme should include the
library’s activities, services rendered, past achievement, relationship with other libraries and
plans and programs for future development and the like. A special preference should be given to
the particular department, in which the newly recruited persons shall have to work. They should
also make a tour to the library to be introduced with other staff, to be acquainted with the library
procedures.
b) Placement: After induction and orientation the jobs to be performed by the newly appointed
members are handed over. Placement implies the assigning or a right job to the right person.
Proper placement is instrumental in increasing output. It avoids wastage of human energy which
may occur by absenteeism or accident. On the other hand a misplaced employee is a liability to
the institution. He may cause serous damage to machinery and other equipment.
Indian National Digital Library in Engineering Sciences and Technology
(INDEST) Consortium
Indian National Digital Library in Engineering Sciences and Technology (INDEST)
Consortium: The Ministry of Human Resource Development (MHRD) has set-up the "Indian
National Digital Library in Engineering Sciences and Technology (INDEST) Consortium" on the
recommendation made by the Expert Group appointed by the ministry under the chairmanship of
Prof. N. Balakrishnan. The Ministry provides funds required for subscription to electronic
resources for 38 institutions including IISc, IITs, NITs, IIMs and a few other centrally-funded
Government institutions through the consortium headquarters set-up at the IIT Delhi.
a) Organization: Those institutes that have static IP address(es), are configured to access the
resources of the consortium; otherwise the publisher allocates Login ID and password to that
institute for accessing their resources. Some resources, like ACM Digital Library and
MathSciNet can only be accessed through static IPs. Local hosting of resources has only been
considered for a few resources.
b) Membership: The INDEST-AICTE Consortium is an open-ended proposition, which all
AICTE-accredited / UGC-affiliated institutions can join. Membership to the INDEST-AICTE
Consortium is open to any private / Government-funded engineering / technological / educational
institution / University for one or more electronic resources. The new members are required to
sign an agreement with the INDEST-AICTE Consortium as well as with the publishers of
electronic resources that they wish to subscribe. The consortium charges an annual membership
fee of Rs. 1,000.00 (Rs. One thousand only).
Total members of INDEST consortium is 520 including Core Members (38) that include
IITs and IISc (8), NITs, ISM, SLIET and NERIST ( 20), IIIT and IIITM (2), IIMs and NITIE (7);
AICTE - supported Members (64); and Self-supported Institutions (99).
c) Functions and Activities: The INDEST-AICTE consortium subscribes to a number of
electronic resources including full-text and bibliographic databases for various categories of
institutions. All electronic resources subscribed are available from the publisher's Web site.
i) Access to Full text E-Resources: The access is provided to many online journals such as e-
book, including Elsevier's Science Direct <http://www.sciencedirect.com/>, Emerald Full-text
<http://iris.emeraldinsight.com/>, Nature <http://www.nature.com/>, Springer Link
<http://www.springerlink.com/>, etc.
ii) Access to Bibliographic Database: MathSciNet <http://www.ams.org/mathscinet>, SciFinder
Scholar <http://www.cas.org/SCIFINDER/SCHOLAR/index.html>, Web of Science
<http://isiknowledge.com>, etc.
iii) Access to Portal: Provides access to J-Gate Custom Content for Consortia (JCCC)
<http://jccc-indest.informindia.co.in/>.
iv) Access to Open Access Resources: It includes access to Open Access E-Journals, Open
Access Directories, etc.
v) Search and Browsing Facility: The browse and search interface allows to search e-journals
and Backfiles subscribed under the consortium for various categories of institutions. One can
also download the list of journals along with their URLs (in xls format) that may be used for
generating Web pages for a Library's Web site by the subscribing institute.
vi) Training Programmes: The training programmes are organised in a distributed mode
wherein all IITs, IIMs and IISc Bangalore may conduct training programme for the member
institutions with financial support from INDEST-AICTE Consortium. Six such training
programmes have already been conducted by IIM Lucknow, IIT Roorkee (Two), IIT Kharagpur,
IIT Bombay and IISc Bangalore (Two).
vii) Mailing Lists and Forum: The Consortium has an active mailing list and a Web site hosted
at the IIT Delhi.
The INDEST-AICTE Consortium is the most ambitious initiative taken so far in the
country. The consortium offers the best possible price advantage ranging from 22% to 95%
(Average > 80% +) through its pricing agreements with publishers as well as better terms of
agreement for various electronic resources. Moreover, the consortium also provides technical
help and arrange for in-house training for optimal usage of resources subscribed.
Indian Library Association (ILA)
Indian Library Association (ILA): In 1933 some of the government of India Librarians,
especially those in Calcutta, under the leadership of K. M. Asadullah organized the first All India
Library Conference. It was at this conference that the Indian Library Association was founded on
12 September, 1933. The ILA Headquarters is in Delhi.
a) Objectives: ILA was formed with three fold objectives. In 1935 two more objectives were
added. An amendment to the constitution of the ILA in 1970 added another four objectives.
Another amendment in 1987 added three more objectives. Some of the objectives of ILA are:
i) Promoting library movement in the country,
ii) Developing Library and Information Science education,
iii) Training and research, improvement of library personnel,
iv) Cooperation at the national and international levels,
v) Promotion of standards, norms, services and guidelines, and
vi) Providing a forum for professionals and publication of materials.
b) Organization: The Council of the association acts as the governing body. The executive
committee is constituted by the council in its very first meeting.
c) Functions and Activities
i) Act as a Driving Force: ILA takes up with the state governments the issue of enacting library
legislation in order to develop the public library system.
ii) Development of the Profession: ILA has been pursuing with the government, UGC and other
concerned bodies at all levels on matter relating to better salary, grades, service condition and
status of the library professionals.
iii) Undertaking of Projects: ILA undertook compilation of “Union catalogue of Periodicals in
the Libraries of South Asia”. Two other projects were allocated to ILA by the UNESCO. They
are “Rendering of Asian Names” and “Directory of Asian Periodicals”.
iv) Publication: Library Bulleting (1942-46), Journal of Indian Library Association (1955-64),
ILA Bulletin, ILA Newsletter, etc some of the publications of the ILA. ABGILA (1949-52), was
another publication, which was an intionym, a confluence of three journals in one periodical that
is Annals, Bulletin, Granthalaya of ILA.
v) Seminars, Conferences, Workshops and Training: ILA holds All India Library Conference
Annually; in 1995 Regional Conferences were started. Besides, the Association also arranges
lectures, round table discussion etc. mostly in Delhi. Several training programmes in computer
application (in Delhi from 2-7th June 1986), use of CDS/ISIS software etc were also organized
with support of NISSAT.
vi) Fellowships, Funds and Grants: Vedanayaki Fellowship for MLISc students; Dr. Umapati
Fellowship for LIS students; P. V. Verghese Prize for the best article contribution to ILA Bulletin,
etc are some of the fellowship and award programmes of ILA for promoting librarianship.
vii) Cooperation: The ILA has cooperation with international organizations such as IFLA,
UNESCO, COMLA, etc. It has also been playing an important role in the JOCLAI, RRRLF,
Good Office Committee (GOC), National Book Trust (NBC), etc.
Indian Association of Special Libraries and Information Centres (IASLIC)
Indian Association of Special Libraries and Information Centres (IASLIC): Three leading
librarians from Calcutta, J. Saha, A. K. Mukherjee and G. B. Ghosh convened a meeting of
librarians and documentalists on June 25, 1955 at Indian Museum, Calcutta. This meeting
resulted in the formation of IASLIC <http://iaslic1955.org> on 3rd September 1955. Dr. Sunal
Lal Hora was unanimously selected as its first president and Jibananda Saha was the general
secretary. IASLIC headquarters is located at P-291, CIT Scheme No 6M, Kankurgachi, Kolkata –
700 054.
a) Objectives: The objectives of IASLIC are to
i) Promote the quality of Library and Information Services;
ii) Coordinate the activities, and
iii) Foster mutual cooperation and assistance among the special libraries, scientific, technological
and research institutions, learned societies, commercial organizations, industrial research
establishments as well as centres of studies in social sciences and humanities;
iv) Improve the technical efficiency of the professionals;
v) Act as a centre of research and studies in special librarianship and documentation techniques;
vi) Act as a centre of information in scientific, technical and other related fields of LIS in
pursuance of the aforesaid objects.
b) Organization: The general body of the members of IASLIC biennially elects 14 office-
bearers and 20 members of the Council, which is the highest organ to formulate the policies and
programmes of work. The Council appoints from among its members the Executive and Finance
Committee consisting of 8 office-bearers and 4 members to manage the regular activities. Six
Divisions are also constituted by the Council for each term. They are
i) Documentation Services;
ii) Education;
iii) Publication & Publicity;
iv) Library Services;
v) Documentary Reproduction and Translation;
vi) Cooperation and Coordination of Libraries.
c) Membership: IASLIC is composed of four kinds of members, namely Honorary Membership,
Donor Membership, Institutional Membership, Individual Membership (Donor, Ordinary
Membership, and Life Membership).
d) Functions and Activities
i) JOCLAI: To bring about mutual co-operation and unified action on matters of common
interests, IASLIC mooted the idea of forming the Joint Council of Library Associations of India
(JOCLAI) especially of those at national level. The JOCLAI meetings take place during the
national meets of each IASLIC and ILA. It has formulated a Code of Ethics for the library
profession in India.
ii) Documentation, Documentary Reproduction & Translation Services: The IASLIC undertakes
compilation of bibliographies and English translation of documents from Russian, German,
French, Chinese, Japanese, etc. and also undertakes imaging of documents for archiving. All
these services are provided on non-profit basis.
iii) Library Consultancy Service: The Association undertakes consultancy services like creation
of computerized bibliographic databases, retrospective conversion of records, preservation &
conservation of documents, cataloguing, classification and stock verification in public and
private organizations on non-profit basis.
iv) Publication: Its publications include IASLIC Bulletin, IASLIC Newsletter, Different books,
Monographs, Directory, IASLIC Proceedings, IASLIC Annual Report, etc.
v) Seminars, Conferences, Workshops and Training: The Association in its continuing education
programmes conducts short term courses, workshops, round tables, seminars etc. It holds a
biennial seminar and a conference in alternate years.
vi) Mailing Lists and Forum: IASLIC Council created Special Interest Groups (SIG) to bring
together persons of common interests. SIG Group meetings are held during IASLIC Conference
of common interests. The SIG includes SIG on Industrial Information; SIG on Social Science
Information, SIG on Computer Application, SIG on Humanities Information, SIG on
Informetrics, and SIG on Library & Information Science Education.
vii) Others: The IASLIC conducts study circle meetings for discussion on various issues of
interest concerning LIS. It also conduct Ranganathan Memorial Lecture which has been held
since 1993 on any topic of Library, Information and Communication science by leading
personalities of the profession. Besides, it also conducts Annual Special Lecture and celebrates
the Librarian’s Day every year.
Identification of Material for Selection
Identification of Material for Selection: Identification is locating and identifying potentially
worthwhile items to be added to the collection(s) of a library. Identification aids for books are-
i) Bibliographies: Bibliographies are a systematic list of books and other works such as journal
articles.
ii) Best Books Guides: Best Books Guide covers the reviews of current works and important
books from the past.
iii) Publisher’s Catalogues: The systematic listing of the books published by a publishing
company.
iv) Reviews: Scientific and technical periodicals, newspapers, trade journals, having book review
columns are important sources of book selection. The critical and evaluative reviews by subject
experts and specialists are the best means for evaluating books.
v) Citation Analysis Tools: The citation analysis tools compute various impact measures for
scholars based on data from citation indices.
vi) Online Databases: An online database is a database accessible from a network, including
from the Internet.
vii) Electronic Resources: the term “electronic resource” describes all of the information
products that are provided through a computer network. This includes electronic books and
journals, bibliographic databases, and library website pages. Eg. Amazon.com
(http://www.amazon.com/), Google Books (http://books.google.com/), etc.
viii) Syllabus of Courses in the Parent Organization: In case of academic library, the demand and
need can also be ascertained by consulting the syllabus of the courses offered by the parent
organization.
ix) Library Statistics: Statistics relating to books circulated from, and consulted in, the library to
know what types of books are heavily used.
x) Library Users’ Recommendation: Suggestions from readers’ indents from subject experts or
departments.
xi) Library Staff: Suggestions from the library staff working in the service departments.
For each item selected from these tools, a book selection slip should be prepared. The
book selection slip should be grouped on the basis of subject or some other criteria.
Hypotheses
Hypotheses: An investigator cannot enter in any field with a blank mind. Normally he or she
begins the task of investigation with some ideas about the subject matter vaguely formulated.
Having thus entered the field of investigation, he or she proceeds to find out whether these ideas
what he or she has conceived are true or false. They may be totally correct or only partially so, or
may be altogether false but as a guide to understanding the problem on hand, these ideas are very
useful. These primary ideas which guide the investigator in his study may be termed as
hypothesis.
The concept of hypothesis has been defined by various scientists in their own ways. Hypo
means “less than” and thesis means “a generally held view”. Etymologically speaking thus the
word hypothesis connotes “a less than generally held view”. It is an assumption or supposition
whose validity is to be tested.
a) Definition: A hypothesis is a tentative answer to a research problem, expressed in the form of
a clearly stated relation between the independent and the dependent variables. Hypotheses are
tentative answers because they can be verified only after they have been tested empirically.
According to Rumel and Belline “a hypothesis is a statement capable of being tested and
thereby verified or rejected”.
According to Goode and Hatt “hypothesis is a shrewd guess that is formulated and
provisionally adopted to explain observed facts, or conditions and to guide in further
investigation”. They further add that “it is a proposition which can be put to test to determine its
validity. It may prove to be correct or incorrect”.
In the words of George Lundberg, “a hypothesis is a tentative generalization, the validity
of which remains to be tested. In its most elementary stage the hypothesis may be any hunch,
guess, imaginative idea, which becomes the basis for action or investigation”.
Barr and Scates define hypothesis as “a hypothesis is a statement temporarily accepted as
true… when the hypothesis is fully established, it may take the form of facts, principles or
theories”.
According to Webster, “a hypothesis is a proposition, condition or principle which is
assumed, perhaps without belief in order to draw out its logical consequences and by this method
to test its accord with facts which are known or may be determined”.
Kerlinger states “a hypothesis is a conjectural statement of relation between two or more
variables. Hypothesis are always in declarative sentence form and they relate whether generally
or specifically variables to variables”.
James E. Creighlon defines hypothesis as “a tentative supposition or provisional guess
which seems to explain the situation under observation”.
In the opinion of J. S. Mill “a hypothesis is only an unproved supposition, a weak form of
proposition”.
Hypothesis simply means a mere assumption or some supposition to be proved or
disproved. It is a preposition or a set of proposition set forth as an explanation for the occurrence
of some specified group of phenomena either asserted merely as a provisional conjecture to
guide some investigation or accepted as highly probable in the light of established facts. Quite
often a research hypothesis is a predictive statement capable of being tested by scientific
methods that relates an independent variable to some dependent variable. It is a statement in a
research, which the study might prove or disprove.
b) Types of Hypothesis: There are different approaches to classify the hypothesis. Some of them
are listed below-
i) Goode and Hatt Classification: According to Goode and Hatt, there are mainly two types of
hypothesis
* Crude Hypothesis: A crude hypothesis is at the low level of abstraction. It indicates the kind
of data to be collected and it does not lead to higher theoretical research.
* Refined Hypothesis: Refined hypothesis are of three types- simple level, complex ideal and
very complex. Simple Level indicates merely the uniformity in social behavior. It does not
involve much verification. Complex Ideal Hypothesis is at higher level of abstraction. This
hypothesis examines the logically derived relations between the empirical uniformities. This type
of hypothesis is useful in developing tools of analysis. It provides constructs for further
hypothesizing. The Very Complex Hypothesis is concerned with the interrelations of multiple
variables.
ii) P. V. Young Classification: Young refers to mainly two types of hypothesis-Working
Hypothesis and Explanatory Hypothesis. Working Hypothesis is a provisional central idea which
becomes the basis for fruitful investigation. The Explanatory Hypothesis refers to the scope of
going into the depth and width with various possibilities so far invisible.
iii) Statistical Analysis: In the context of statistical analysis, a hypothesis may be any one of the
following types-
* Null Hypothesis: Null means Zero. The null hypothesis is a statistical proposition which
states, essentially that, there is no relation between the variable (of the problem). When a
hypothesis is stated negatively, then it is called as a null hypothesis. A null hypothesis is used to
collect additional support for the known hypothesis. The null hypothesis says, “You are wrong,
there is no relation, disprove me if you can”. The objective of the null hypothesis is to avoid
personal bias of the investigator in the matter of data collection.
* Alternative Hypothesis: That which is concluded rejecting the null hypothesis is known as
alternative hypothesis. Alternative hypothesis is formulated embracing a whole range of values
rather than a single point.
For example:
HA = the males visited cinema more than the female.
H0= the males and females do not different in respect of the frequency of seeing cinema.
So, alternative hypothesis is usually the one which one wishes to prove and the null
hypothesis is the one which one wishes to disprove.
iv) Others: Hypothesis may further be classified into Descriptive Hypothesis and Rational
Hypothesis. Descriptive hypothesis are propositions that typically state the existence, size, form,
or distribution of some variables. The Rational hypothesis on the other hand is a statement that
describes the relationship between two variables. Eg. Families with higher income spend more
for recreation.
c) Difficulties in Formulating a Hypothesis: According to Goode and Hatt, the following
difficulties arise in formulating the hypothesis-
i) Lack of Previous Knowledge of the Field of Enquiry: In the absence of knowledge
concerning a subject matter, one can make no well founded judgment of relevance hypothesis.
ii) Lack of Clear Theoretical Background: Hypothesis do not have a clear cut and definitive
theoretical background, partly it is a matter of lifting upon an idea on some problem.
iii) Lack of Logical Background: Formulation of proper hypothesis to a great extent depends on
one’s experience and logical insight.
iv) Lack of Knowledge of Scientific Method: It is not always possible to have complete
information of and acquaintance with the scientific methods for formulating hypothesis. This
lack of scientific knowledge presents difficulty in formulation of hypothesis.
d) Functions of Hypothesis: Cohen and Nagel’s are of the view that we cannot take a single
step forward in any inquiry without a hypothesis. Without hypothesis mere collection of data is
likely to lead the researcher anywhere without aim and produce no result. The main functions of
hypothesis are-
i) Prevent Blind Research: It spells out the difference between precision and haphazard research,
between fruitful and fruitless research. It helps in selecting pertinent factors. It makes the enquiry
more specific and to the point.
ii) Foundation of Research: The hypotheses are the foundation of scientific research. If a proper
hypothesis is formulated then one fourth of the research works comes to an end.
iii) New Experiment and Observation: A hypothesis what we are looking for is a proposition
which can be put to test to determine its validity.
iv) Provide Direction to Research: Hypothesis shows the line, in which way the researcher has
to proceed. Hypothesis is investigator’s eye – a sort of guiding light in the world of research
darkness to identify which is relevant and which is irrelevant
v) Link the Investigation with Theory: Hypothesis is necessary to link between investigation
and theory, which lead to the discovery of additional knowledge.
vi) Serve as a Framework for Drawing Meaningful Conclusion: Direct answer to the
hypothesis being tested.
vii) Lead to Discovery of Laws: Hypothesis leads one to the discovery of laws and theory.
e) Conclusion: A hypothesis looks forward. It is a proposition which can be put to an empirical
test to determine its validity. Every worthwhile theory permits the formulation of additional
hypothesis. These, when tested, are either proved or disproved and thus in their own constitute
further tests of the original theory.
Human Resource Management
Human Resource Management: Human resources are acknowledged as the most valuable and
important assets in any organization and recognized as a valued resources with potential. These
are no longer associated with problems and cost. Human resource management is sometimes also
known as personal management.
a) Definition: Personal management implies a process of getting the best out of the employees
of an organization by means of judicious selection, tactful dealing and by seeking their
replacement, if necessary.
A formal definition of personnel management is that it is a function performed in
organizations that facilitates the most effective use of employees to achieve organizational and
individual goals.
According to O. Tead and H.C. Metcaffe personnel management is “the direction and co-
operation of human relations of any organization with a view to getting the maximum necessary
production with a minimum of effort and friction and with a proper regard for the genuine well
being of workers.”
b) Aims of Personnel Management: The aim of personnel management is to develop
capabilities of individual persons towards understanding appreciation and solution of problem.
Each staff member should get a feeling that his works form a vital part of the working of the
organization. In simple, the aims of personnel management are:
i) Optimum output;
ii) Development of workers capabilities by enabling the workers to derive maximum satisfaction
from their work;
iii) Development of team spirit;
iv) Continuous vigilance.
c) Importance of Personnel Management: The rationale behind recognizing the role of human
resources management is that:
i) Human resources who are employed in the organization are human being with some aspiration
and ambition in life.
ii) Though humans are utilized as means to an end in the production process they are ultimate
sharer of profit.
iii) The personnel being a part of the community are also the consumers as well.
iv) The manpower of any organization is responsible to perform the duties and all operational
work and is the one who ran an organization.
v) Human resources are the best resources of any organization in comparison to all other physical
resources. It is they who convert material into suitable commodities.
vi) If the energies of the personnel can be channelised in right direction, they can overcome the
constrains and limitations of other physical resources.
d) Function of Personnel Management: Personnel management is a staff function. It is
advisory in nature. It recommends, cooperates and counsels. The main functions of personnel
management may be grouped under the following broad heading-
i) Manpower planning.
ii) Job analysis
iii) Job description
iv) Staffing
v) Recruitment, selection and test
vi) Induction, orientation and placement
vii) Training and development (continuous education)
viii) Motivation of personnel
ix) Leadership
x) Wage and salary administration
xi) Employer – Employee relationship (supervise, control)
xii) Performance evaluation.
Henry Mintzberg in his “the nature of managerial work” (1973) described the following roles to
be played by the top man in management.
i) Figurehead
ii) Leader
iii) Liaison
iv) Monitor
v) Disseminator
vi) Spokesman
vii) Entrepreneurs
viii) Disturbance handler
ix) Resource allocator
x) Negotiator
e) Problems in Personnel Management: The problems associated with personnel management
are-
i) Increasing government regulation regarding employment practices: The reservation for
schedule caste and tribes, backward classes, government regulation on recruitment, resignation,
dismissal, retirement, etc. creates problem in personnel management.
ii) Pressure and bargaining with union: The pressure from union or bargaining with union for
working condition and benefit creates another problem.
iii) Insufficient budget: Decreasing or stable budget can disturb staffing pattern. It might lead to
vacancies being allowed to remain vacant.
History of a Computer
History of a Computer: It is difficult to identify any one device as the earliest computer, partly
because the term "computer" has been subject to varying interpretations over time. It was the
fusion of automatic calculation with programmability that produced the first recognizable
computers.
1. The Beginning: Examples of early mechanical calculating devices included the abacus, the
slide rule and arguably the astrolabe and the Antikythera mechanism (which dates from about
150-100 BC). The end of the middle ages saw a re-invigoration of European mathematics and
engineering. Wilhelm Schickard's 1623 device was the first of a number of mechanical
calculators constructed by European engineers. However, none of those devices fit the modern
definition of a computer because they could not be programmed.
a) Abacus: The concepts of number and counting are believed to have been developed first by
the herdsmen of ancient times, who sought to avoid animal losses. It can be traced back to 3000
BC. The herdsmen (or the Stone Age men) used small round stones (pebbles) for counting cattle.
After counting with pebbles, the successor was a tool known as ABACUS, which is treated as the
first mechanical computing device. The word “Abacus” is derived from the Greek word ‘abakos’
which means a board or calculating tables. Beads are strung on wires or strings held in a frame
and they are slid along the wires counting, adding, etc. It was invented by the Chinese in 3000
BC, which was later improved by the Egyptians and the Greeks.
b) Mechanical Theater: Hero of Alexandria (c. 10 – 70 AD) built a mechanical theater which
performed a play lasting 10 minutes and was operated by a complex system of ropes and drums
that might be considered to be a means of deciding which parts of the mechanism performed
which actions and when.
c) Joseph Marie Jacquard: In 1801, Joseph Marie Jacquard made an improvement to the textile
loom that used a series of punched paper cards as a template to allow his loom to weave intricate
patterns automatically. The resulting “Jacquard loom” was an important step in the development
of computers because the use of punched cards to define woven patterns can be viewed as an
early form of programmability.
d) Napier’s Bones: John Napier was the inventor of logarithms. He used his data tables and with
the help of a mechanical device could do the necessary computing.
e) Pascal’s Machine Arithmetique: In 1642 Blaise Pascal, a French mathematician invented a
mechanical adding machine, a prototype of the digital calculating machine. This device was able
to add and subtract directly, whereas multiplication and division were performed through
repeated addition and subtraction respectively.
f) Leibnitz’s Stepped Reckoner: Gottfried Withelm Von Leibnitz, a German mathematician
invented a more advanced calculating machine in 1671, which could not only add but also
multiply, divide and extract square root. As the machine could make a series of repeated
additions, it was called the Stepped Reckoner. The merit of Leibnitz’s contribution is that he
showed the advantage of binary system over decimal system in the operation of mechanical
computer.
g) Punched Card: A French weaver’s son named Joseph Marie-Jacquard made the next
significant contribution in 1804. After observing how his father could make different weaving
patterns on the loom, he thought of storing these patterns for future use. So, he developed a plate
with multiple holes to control the weaving patters, not knowing that only his idea of storing the
weaving patterns would be used to store data and would be called the Punched Card. A Punched
card is a thin rectangular card divided into 80 columns and 12 rows in which the various
characters could be represented by punching holes in different rows and columns. On one card it
is possible to punch 80 characters – one character per column, thus it is possible to store 80
characters of data.
h) Babbage’s Difference and Analytical Engines: Charles Babbage, a professor of
Mathematics, designed a computing machine in 1822 for the purpose of producing ballistic
tables called the “Difference Engine”. Then he conceived the idea of a new computing machine
in 1833 and designed the machine in 1835 called Analytical Engine, which is the forerunner of
the modern computer. It could be called as the first digital computer having the memory and the
calculating units as well as sequential control with provision for automatic printout. Thus,
Charles Babbage is widely regarded as the father of the computer. Due to limited finances, and
an inability to resist thinking with the design, Babbage never actually built his Analytical Engine.
(The Analytical Engine should not be confused with Babbage's Difference Engine which was a
non-programmable mechanical calculator).
i) Lady Ada Lovelace: Lady Ada Lovelace, an amateur mathematician, and a friend of Babbage
produced supporting material for the “Analytical Engine” in the form of programs, and
explanatory documentation. As such, she is considered the first lady computer programmer. ADA
is one of the programming languages named after her.
j) Boole’s Symbolic Logic: George Boole, the famous logician, discussed symbolic logic in
1859 in his work ‘Treatise of differential equation’. The development of symbolic logic and the
application of binary logic operation AND, OR, NOT are his main contribution to modern
computer technology.
k) Hollerith’s Punched Card Machinery: Dr. Herman Hollerith, an American statistician
invented the punched card machinery in 1886. Large-scale automated data processing of punched
cards was performed for the U.S. Census in 1890 by tabulating machines designed by Herman
Hollerith and manufactured by the Computing Tabulating Recording Corporation, which later
became International Business Machine (IBM) Corporation. The punched card invented by
Hollerith is still used as the basic input medium to computers.
l) Aiken and MARK I: This computer is also known as automatic sequence controlled
calculator, which was designed by Howard A. Aiken of Harvard University. It is also known as
Harvard MARK I. It is the first fully electro-mechanical computer.
m) Stibitz’s Machine, MARK II and SSEC: George R. Stibitz developed a large relay
computer at Bell Telephone Laboratories in 1946. Aiken built the MARK II, the large relay
computer in 1947. Another machine was also constructed by the people of IBM Corporation. It
was known as the Selective Sequence Electronic Calculator (SSEC).
n) The Atanasoff-Berry Computer: This electronic machine was also known as ABC
(Atanasoff-Berry Computer) as it was named after its founder Dr. John Atanasoff and his
assistant Clifford Berry. The non-programmable Atanasoff–Berry Computer (1941) used vacuum
tube based computation, binary numbers, and regenerative capacitor memory.
o) Colossus Computers: The secret British Colossus computers (1943) (Copeland, 2006), had
limited programmability but demonstrated that a device using thousands of tubes could be
reasonably reliable and electronically reprogrammable. It was used for breaking German wartime
codes.
p) Z Machines: In 1941, Konrad Zuse's electromechanical "Z machines" (Z3) was the first
working machine featuring binary arithmetic, including floating point arithmetic and a measure
of programmability. In 1998, the Z3 was proved to be the world's first operational computer.
q) Bush and Memex: Memex is a device in which an individual stores all his books, records and
communications, which is mechanized so that it may be consulted with exceeding speed and
flexibility. Dr. Vannevar Bush visualized the library of the future with mechanized services from
housekeeping to operation.
2. Early Electronic Computer: The early electronic computer can be categorized into the
following-
a) ENIAC: (Electronic Numerical Integrator And Calculator): This computer was built by a
team at the University of Pennsylvania, designed by a team of members from the USA headed by
Professor J. Presper Eckert and John Mauchly. The U.S. Army's Ballistics Research Laboratory
ENIAC (1946), which used decimal arithmetic, is sometimes called the first general purpose
electronic computer (since Konrad Zuse's Z3 of 1941 used electromagnets instead of
electronics). Initially, however, ENIAC had an inflexible architecture which essentially required
rewiring to change its programming.
Several developers of ENIAC, recognizing its flaws, came up with a far more flexible
and elegant design, which came to be known as the stored program architecture or Von Neumann
architecture. This design was first formally described by John Von Neumann in the paper "First
Draft of a Report on the EDVAC", published in 1945. A number of projects to develop computers
based on the stored program architecture commenced around this time, the first of these being
completed in Great Britain. The first to be demonstrated working was the Manchester Small-
Scale Experimental Machine (SSEM) or "Baby".
b) BINAC (Binary Automated Computer): Mauchly and Eckert established their own
company and design the BINAC in 1950, which was the first machine to use self checking
devices.
c) EDVAC (Electronic Discrete Variable Automatic Computer): Dr. John Von Neumann and
the ENIAC group designed this computer. The device could store both the instruction and the
data in the binary form, instead of human readable words or decimal numbers.
d) EDSAC (Electronic Delay Storage Automatic Calculator): It was developed by the
Britishers, headed by Professor Maurice V. Wilkes at the Cambridge University Mathematical
Laboratory. It was much faster than EDVAC. EDSAC was one of the first computers to
implement the stored program (Von Neumann) architecture.
The EDSAC which completed a year after SSEM, was perhaps the first practical
implementation of the stored program design. Shortly thereafter, the machine originally
described by von Neumann's paper EDVAC was completed but did not see full-time use for an
additional two years.
e) SEAC (Standard Eastern Automatic Computer): The US National Bureau of Standards
constructed this computer following the design of EDVAC and was completed in 1950. It was
the first stored-program American Computer.
f) Manchester Mark I (1948): This machine was designed by a group of scientists headed by
Professor M. N. A. Newman.
g) UNIVAC I (Universal Automatic Computer): Mauchly and Eckert designed and built
UNIVAC I. It was the first computer to handle both numerical and alphabetical information.
h) MARK III and IV: Aiken built MARK III with magnetic drum storage at Harvard in 1950
and MARK IV, an improved version of MARK III, in 1952.
3. Modern Electronic Computer: Modern electronic computers have a faster speed. A major
breakthrough in the computer technology was made by introducing transistor in place of vacuum
tubes during the early sixties. With the development of transistor it was possible to design printed
circuit, integrated circuit and other miniaturization techniques in the structure of computer.
The first devices that resemble modern computers date to the mid-20th century (around
1940 - 1945), although the computer concept and various machines similar to computers existed
earlier. Early electronic computers were the size of a large room, consuming as much power as
several hundred modern personal computers. Modern computers are based on tiny integrated
circuits and are millions to billions of times more capable while occupying a fraction of the
space. Today, simple computers may be made small enough to fit into a wristwatch and be
powered from a watch battery.
In 1946, ENIAC consumed an estimated 174 kW. By comparison, a typical personal
computer may use around 400 W; over four hundred times less (Kempf, 1961). Early computers
such as Colossus and ENIAC were able to process between 5 and 100 operations per second. A
modern "commodity" microprocessor (as of 2007) can process billions of operations per second,
and many of these operations are more complicated and useful than early computer operations.
Generations of Computers
Generations of Computers: Computer generation means step by step changes and each major
change or progress after a period of time. Since inception there are totally five generation of
computers.
a) First Generation Computer (Up to 1950): ENIAC was the first valve based computer and
taken as first computer of first generation of electronic digital computer. It was made by J. P.
Eckert and John W. Mauchly in 1946. EDVAC, EDSAC, UNIVAC are some other examples of
computer of this generation. This generation computer possessed the following characteristics:
i) Used thermionic valves or vacuum tube or electronic valve;
ii) Used Mercury line for storage and paper tapes and punched cards were also used;
iii) Computer programming was mainly done in machine language;
iv) All the computers were of very big size and so required very large space;
v) The computers were very costly;
vi) Limited programming capabilities, memory;
vii) Slow operating speed and restricted computing capacity;
viii) High power consumption (each vacuum tubes consumed about half a watt power);
ix) Vacuum tubes used filament as a source of electron; they have a limited life.
x) Large amount of heat generated from the vacuum tubes and so they needed air-conditioning.
b) Second Generation Computer: The invention of transistor (short names for transfer resistor)
in 1948 led to the development of second generation of computer. Their main disadvantages were
that the commercial productions of transistors were difficult and expensive; again, the manual
assembly of individual components into a functioning unit was required. Examples of second
generation of computer include UNIVAC-1108, IBM 700, 1401, CDC 1604, 3600.
The second generation computers are characterized by the following:
i) Transistors replaced the vacuum tubes completely;
ii) Use of magnetic cores for memory storage. Magnetic drum, magnetic disc, punched card were
also used for storage purpose;
iii) Use of high level language like FORTRAN, COBOL, Algol, SNOBOL etc.;
iv) Due to the use of transistors the sizes turned to be smaller;
v) Less costly in comparison to the first generation of computer;
vi) Memory capacities were about 100 Kilobyte;
v) Reduction in computation time from millisecond to microsecond;
vi) Transistors consume only a tenth of power as required by vacuum tubes;
vii) Transistors have no filament to burn as against the first generation of computer so they were
more reliable;
ix) Less heat was generated due to the use of transistor but still needed air conditioning and
frequent maintenance.
c) Third Generation Computer: The third generation began in 1965 with germanium
transistors being replaced by silicon transistors (=integrated circuit). Integrated circuit is a circuit
consisting of transistors, resistors and capacitors grown on a single chip of silicon eliminating
wired interconnections between components. Highly sophisticated technology was required for
the manufacture of the chips, but still commercial production become easier and not so
expensive. Remote processing and time sharing is also an added advantage of this generation of
computer. Example: IBM 360 Series, ICL 1900 series, IBM 370/168, ICL 2900, Honeywell 6000
series. This generation computer has the following characteristics
i) Use of integrated circuit;
ii) Use of semiconductor memories in addition to, and later instead of, ferrite core memory. The
two main types of semiconductor memory are Read-Only Memory (ROM) and read-and-write
memories called Random Access Memory (RAM);
iii) Extensive use of high level programming languages;
iv) Smaller size and better performance, more flexibility with input/output;
v) Less costly in comparison to the second generation of computer and become popular as mini
computer and are quite portable;
vi) Memories improved to 4 Megabytes;
vii) Reduction in computational time from microseconds to nanoseconds;
viii) Lower heat generation and quite less power requirement;
ix) More reliable in comparison to the second generation of computer;
x) Air conditioning required in many cases;
d) Fourth Generation Computer: The fourth generation of computer may be identified by the
advent of the microprocessor chip. The whole computer CPU except primary memory is placed
on a single chip. This chip is known as microprocessor.
Examples: Intel 4004, Apple series I and II, spectrum 7 etc.
1. Steps in Formulating a Research Proposal: Though there is no thumb rule for formulating a
research topic, yet the following will throw a light in this direction.
i) Identifying Area of Specialization: In choosing any topic for research the first and foremost
thing is the identification of the areas what one likes most.
ii) Discussion with Peers: In the very second step one should ask or talk with his / her peers
(including seniors and teacher) about the topic and by this way should try to collect some more
information on the topic at hand.
iii) Using Science: The person concerned in the next step should employ science in way of
viewing the topic based on the concept of order, external reality, reliability, parsimony, and
generality.
iv) Literature Search: Literature search is essential in order to be aware of the existing research
and to know what has already come out to the surface. Different form of literature both macro,
micro and web covering all aspect of the topic should be studied at this step itself. Literature
searching tool includes guides to literature; bibliographies, citation analysis (forward search);
library catalogue, indexing and abstracting journals, search engines; Meta search engine; wiki
search engines, etc. During literature search activity one should collect all the relevant
documents. It will be needed to summarize the results of previous research to form a foundation
of the present one and to collect ideas about what methodologies, techniques and tool were used
by previous researchers in case of near topic that one is supposed to choose for and to assess the
success of the previous research work based on the methodologies, techniques and tools
undertaken.
v) Research Method, Tools and Techniques: Based on the literature search, the research scholar
should seek for alternative, judge himself/herself why earlier investigators choose their course of
action, what are their shortcomings, whether other approaches can be used for such type of
investigation and so on.
vi) Key Concepts: In the next step, the research scholar should try to list and define key concepts
and terms and also be alert to the latest happenings on the subject;
vii) Problem Identification: The research scholar now should find out, what is missing in the
existing literature. In doing so he/she should go from general to particular problem, and then
should break the problem.
viii) Judging Yourself: Now after identification of the problem one should judge himself/herself
whether he/she is fitted to take this topic, in regard to his/her expertise, time and skill, if not
he/she must again start from the point number (i) and choose other alternatives;
ix) Research Proposal: In this step the research scholar should prepare the research proposal,
making judgment to make others convinced regarding the value of the research work, map out all
the arguments in the form of research proposal and so on.
x) Communicating the Proposal: The proposal should be communicated with the expected
research supervisor.
2. Contents of a Research Proposal: A research proposal in general consists of the following
parts-
Sl. No. Contents Page
1 Title Page 1
2 Introduction 1
5 Topic Justification 1
7 Literature Review 5
8 Methodology 2
10 Risk Analysis 1
11 Schedule* 1
12 References 1
* The Schedule will include time needed for extensive literature search, research design
to conduct the main study, and time needed to write the research findings.
3. Writing Research Proposal: Though it is not mandatory, the following steps are followed in
writing a research proposal-
a) Setting up Template: Template like using of Font = Times New Roman; Font Style =
Regular; Font Size = 12; Alignment = Justify; Line Spacing = 1.5. For heading purpose one can
use Font Style: Bold, rests are same and like that.
b) Avoiding Biasness: For any type of research proposal writing it would be better to restrict
using “I” except in the introduction chapter, in other parts of the report it should be replaced by
“the researcher”, “the author”, and such appropriate words.
c) Table and Graphs Names: In case of table and graph naming, the rule of thump is to naming
the table and graph by using the chapter name followed by table or graph number starting freshly
from the beginning of each chapter.
d) Checking: After writing the research proposal the research scholar need to check for the
following:-
i) Whether all text formatting guidelines are followed or not.
ii) Quotations are complete and followed by in text citation or not.
iii) In text citation are included in the references pages or not.
iv) Is there any jumping in sentences and if it is then it should be made a smooth flow of ideas.
Finance
Financial Management: The sections or parts of the library depend on how big the library is
and what its resources and collections are. Sometimes, they are also based on the type of library
i.e. whether it is a school library or a public library or a college or university library.
The administrative section of a library is the nerve centre to the entire administrative
system of the library. It aims to assist the establishment activities of the library. It is staffed with
skilled and partially-skilled personnel for handling the task of management and finance, which
involves the tasks such as building cleanliness, building maintenance, lift maintenance, central
air conditioning maintenance, vehicle maintenance, staff safety, staff leave and staff matters,
payment processing, revenue collection, etc. This section also ascertains that all circulars, rules
and regulations are upheld and keeps and maintains the records pertaining to various budgetary
provisions of the library like salary, expenditure and other matters pertaining to physical stock
and infrastructure of the library. More long-term issues include the planning of the construction
of new libraries or extensions to the existing ones.
Finance: The word “Finance” means to obtain or provide money for some programme or
activity and budget is a list of all planned expenses and revenues. The word “finance” is used to
express any statement of monetary accounts or comparison of income with expenditure. Broadly
speaking, finance is concerned with obtaining funds and making the optimal use of these funds.
It is the life blood of any institution or firm and is essential for its effective functioning.
Finance plays a very important and significant role in the organization and management
of the libraries. Libraries are not profit making institutions; they are spending institutions. Once a
library has been established then funds would be required on a recurring basis to maintain it in
proper order and shape. It heavily depends on the continuous supply of funds for organizing their
activities, programmes and services. In addition, libraries are growing organizations, larger a
library grows; the more money it might require for its maintenance it. So, for continuous supply
of funds there should be some assured sources of income for each and every library.
a) Sources of Fund for the Library: Different types of libraries receive funds from different
sources, though some of them are common to all types of libraries.
i) Funds from Parent Organization: The university libraries get financial support from their
respective universities out of their own funds; college libraries get financial support from the
college budget. Same is the case for school; which is fully financed by the school management.
Libraries attached to other teaching institutions are also fully financed by the management of the
concerned institution.
ii) Grants from UGC: UGC is the second major source of income to the college and university
library. The UGC grants are mainly plan grant which are mainly of three types:
- Recurring grants;
- Non-recurring grants;
- Adhoc grants.
The recurring grants are given for the purpose of books and periodicals, maintenance of
regular services and for anticipated contingency. The non recurring grants are given for specific
equipment. The adhoc grant is given for specific purposes on the recommendation of the various
visiting UGC groups.
iii) Grants from Raja Rammohun Roy Library Foundation (RRRLF): RRRLF is an autonomous
organization under Dept of Culture, Govt of India and it provides book assistance (matching and
non matching grants) and financial assistance to different kinds of libraries.
iv) Library Legislation: Library tax / rates form the basis of financial support for public libraries
in the states having library legislation. Library rate is levied by a local authority but the tax is
levied by state or central government.
v) Central Government Grants: The central universities are directly funded by the Central
government (Ministry of Human Resource Development) through UGC.
vi) State Government Grant: The maintenance of state universities depends on the grants of the
State government. The government grants are not directly given to the academic libraries.
Government provides grants for parent organization and then the parent organization allots the
necessary share to the library. The grants given by state government to the libraries of various
universities are mainly non-plan grant.
In case of a school library in some cases the state government, municipal bodies, local
bodies or other organizations give funds occasionally. The government schools get full assistance
from the state government.
vii) Fees and Caution Money: Almost each academic library charges fee from the students who
become their members for the use of the library whether it is a university library or school
library. But, the amount of library fee is usually so meager that it cannot be considered a
dependable source of finance. Many libraries receive caution money from the reader. It is
refundable and is refunded when a reader surrenders his/her library membership. But its interest
may become a source of income for the library.
viii) Fine and Penalties: The libraries can impose fine and penalties for the late return of books
or against losses or misuse of books. But it is not enough to be considered as a source of finance
because its main aim is to compel the users to return the borrowed books in time and not to
damage it.
ix) Research Activities: When research projects are approved by the UGC, the government
departments like DST, CSIR, Planning Commission, etc or other agencies like ICSSR, ICHR,
ICPR, etc, a part of the research grant is kept for books and journals which, after the completion
of the project, are to be deposited in the university or college library.
x) Endowment and Private Donation: Libraries sometimes receive gift both in cash and kind
from various sources. Generally, people with charitable bent of mind and those who love
learning and believe in imparting learning to their fellow-beings donate a good number of books
from their own collection. But these endowments and private donations are not permanent
sources of finance and the libraries cannot depend on them.
xi) Sale of Publication: The library helps a university in publications and some libraries may
have their own publications. The sale proceeds of these publications go to the library. Some big
libraries publish and sell catalogues, bibliographies, etc. and thereby raise their funds.
The income from all these publications should not be considered as a source of revenue
since these publications should be made available to the user on no profit no loss basis so that the
readers may be made interested in using the library resources.
xii) Income from Service: Libraries generally provide reprographic, translation, services and do
charge subsidized rates for such works. These also form a source of income for the libraries.
xiii) Other Sources: Libraries can also generate their funds by sale of waste papers, money
received from rent of the seminar hall of the library, etc. All these also form a small source of
income for the library.
Library tax/rates form the basis of the financial support for public libraries in the states
having library legislation. In college libraries, library fee and grants from the state and Central
Government are the main sources. In a special library, money would come from the parent body.
In case of the Central University libraries, UGC is the source. Gifts and endowment are not very
common.
Environmental Information System (ENVIS)
Realising the importance of Environmental Information, the Government of India, in December,
1982, established an Environmental Information System (ENVIS) as a plan programme. ENVIS
is a decentralised system with a network of distributed subject oriented Centres ensuring
integration of national efforts in environmental information collection, collation, storage,
retrieval and dissemination to all concerned. Presently the ENVIS network consists of Focal
Point at the Ministry of Environment and Forest and ENVIS Centres setup in different
organizations / establishments in the country in selected areas of environment. These Centres
have been set up in the areas of pollution control, toxic chemicals, central and offshore ecology,
environmentally sound and appropriate technology, bio-degradation of wastes and environment
management, etc.
ENVIS India has already established Eighty One partner nodes, which include thirty
government departments, Thirty Six Institutions and Fifteen NGOs. These nodes are supposed to
create websites on specific environment related subject areas.
1. Aims and Objectives: ENVIS focal point ensures integration of national efforts in
environmental information collection, collation, storage, retrieval and dissemination to all
concerned.
1.1 Long-term objectives
a) To build up a repository and dissemination centre in Environmental Science and Engineering;
b) To gear up the modern technologies of acquisition, processing, storage, retrieval and
dissemination of information of environmental nature; and
c) To support and promote research, development and innovation in environmental information
technology.
1.2 Short-term objectives
a) To provide national environmental information service relevant to present needs and capable
of development to meet the future needs of the users, originators, processors and disseminators
of information;
b) To build up storage, retrieval and dissemination capabilities with the ultimate objectives of
disseminating information speedily to the users;
c) To promote, national and international cooperation and liaison for exchange of environment
related information;
d) To promote, support and assist education and personnel training programmes designed to
enhance environmental information processing and utilization capabilities;
e) To promote exchange of information amongst developing countries.
2. Functions:
i) EMCBTAP: ENVIS has started implementing the World Bank assisted Environment
Management Capacity Building Technical Assistance Project (EMCBTAP) since January, 2002
which aims at structuring the ENVIS scheme by extending its reach through involvement of
Institutions / Organizations in State Governments, academia sector, corporate sector, NGO
sector, etc.
ii) ENVIS-Nodes: To strengthen ENVIS in disseminating information pertaining to environment
and sustainable development, ENVIS India establishes different ENVIS Nodes by involving
Organizations, institutions, Universities and Government departments working in diverse areas
of environment.
3. Conclusion: ENVIS due to its comprehensive network has been designed as the National
Focal Point (NFP) for INFOTERRA, a global environmental information network of the United
Nations Environment Programme (UNEP). In order to strengthen the information activities of
the NFP, ENVIS was designated as the Regional Service Centre (RSC) of INFOTERRA of
UNEP in 1985 for the South Asia Sub-Region countries.
Electronic Mail (Email)
Electronic Mail (Email): The Electronic mail often abbreviated as Email, email, e-mail or
simply mail. It enables us in exchanging digital messages. Electronic mail can be termed as the
fastest post office which is the most commonly used service of the internet. The messages can be
sent instantaneously to any individual who has an email address or to many persons at the same
time.
The foundation for today's e-mail service was created in the early ARPANET in extension
to the File Transfer Protocol (FTP). An e-mail sent in the early 1970s looked very similar to one
sent on the Internet today but today it is carried by the Simple Mail Transfer Protocol (SMTP).
a) Email Address: The email address has three basic components. The “username”, the “@”
sign and the “users’ location or domain”. Each Email address goes from the specific to the
general. A typical example is “lis-forum@ncsi.iisc.ernet.in”. Here
lis-forum: It is the user id.
@: It is a separator between user id and different organizational level of the institution.
Rest: The rest portions after “@” sign are the level of the domain name. Levels of the domains
are nothing but different organizational levels. In the above example there are four levels to the
domain name.
ncsi: It stands for National Centre for Scientific Information.
iisc: It stands for Indian Institute of Science. The National Centre for Scientific Information is a
part of the Indian Institute of Science.
ernet: It stands for the Education and Research Network. The IISC is covered under ERNET.
in: It stands for India.
The above one is a very complex example of email address. However, our mostly used
email address has only three to five components. For example, in the rohit@gmail.com email id,
“rohit” is the user id, “@” is the separator, “gmail” stands for Google Mail, which is the email
service provider, and “.com” means Gmail is the commercial organization.
b) Anatomy of Email Message: Messages in an electronic mail consists of three major sections.
The message header, the message body, and attachment. The first two form the email’s content.
i) Header: The message header contains control information, including, minimally, an
originator's email address and one or more recipient addresses. Usually, additional information is
added, such as a subject header field structured into fields like summary, sender, receiver, and
other information about the e-mail. The message header generally includes at least the following
fields:
From: It includes the e-mail address and, optionally, the name of the sender who sends the email.
The field is filled up automatically when a message is sent.
To: Here the e-mail address(es) and, optionally, name(s) of the message's recipient(s) is/are
included. It indicates primary recipient (more than one allowed), for secondary recipients Carbon
copy (Cc) and Blind Carbon Copy (Bcc) is used to make the data individual to other recipient.
The "To:" field is similar to the addressing at the top of a conventional letter which is delivered
according to the address on the outer envelope. Many e-mail clients will mark e-mail in the
inbox differently depending on whether the addresses are in the “To:” or “Cc:” list.
Subject: A brief summary of the message.
Date: The local time and date when the message was written. Many email clients fill this in
automatically when sending. The recipient's client may then display the time in the format and
time zone local to her.
Message-ID: It is also an automatically generated field used to prevent multiple deliveries and
for reference in “In-Reply-To”. The In-Reply-To is used to link related messages together.
ii) Body: The e-mail clients generally allow the use of either plain text or HTML for the message
body at the option of the user. HTML e-mail messages often include an automatically-generated
plain text copy as well, for reason of compatibility. The body sometimes contains a signature
block at the end. This is exactly the same as the body of a regular letter. The header is separated
from the body by a blank line.
Advantages of HTML extend to the ability to include inline links and images, to set apart
previous messages in block quotes, wrap naturally on any display, use emphasis such as
underlines and italics, and change font styles. Its disadvantages include- the increased size of the
email, privacy concerns about web bugs, abuse of HTML email as a vector for phishing attacks
and the spread of malicious software. Mailing lists commonly insist that all posts to be made in
plain-text for all the above reasons. Again, a significant number of readers using text-based e-
mail clients. So, avoiding HTML can guarantee delivering the email.
iii) Attachments: The attachments are the files that are sent through the email. Many email
systems does not allow the software or the file that contains “setup.exe” to be sent through email
as attachments.
c) Advantages and Disadvantages of Email: There are numerous ways in which people have
changed the way they communicate. E-mail is certainly one of them, particularly when others
live at a distance. E-mail provides a way to exchange information between two or more people
with no set-up costs and with little or no expense. With real time communication by meetings or
phone calls, participants have to work on the same schedule, and each participant must spend the
same amount of time in the meeting or call. E-mail allows each participant in controlling their
schedule independently.
Most information or business workers today spend from one to two hours of their
working day on e-mail: reading, ordering, sorting, and writing.
The advantages of email over post offices are –
i) Its high speed;
ii) No cost of paper envelop and postal system;
iii) The system provides surety of the delivery of mail because if the mail is not delivered due to
some reason then the undelivered mail bounces back to the sender, mostly within minutes.
iv) The email also allows to attach word processing document, picture, graphic, video etc.
The disadvantages of email are: it is a push technology i.e the sender controls who receives the
information. Convenient availability of mailing lists and use of "copy all" can lead to people
receiving unwanted or irrelevant information of no use to them. The other problems include
Information overload, spamming (unsolicited commercial or bulk e-mail) computer viruses, e-
mail bombardment (the intentional sending of large volumes of messages to a target address),
phishing (the criminally fraudulent process of attempting to acquire sensitive information such as
usernames, passwords and credit card details by masquerading as a trustworthy entity in an
electronic communication), e-mail worms (using e-mail as a way of replicating themselves into
vulnerable computers) and E-mail spoofing (when the header information of an email is altered
to make the message appear to come from a known or trusted source. It is often used as a trick to
collect personal information).
E-documents
E-documents: The term e-document or e-text is a broader term that includes the document in
ASCII text format. It may be content from a website, blog, wiki, discussion forum, discussion
group, online journal and so on.
The salient features of electronic documents are:
i) They can be delivered to the desktop (although the desktop needs a computer)
ii) They can be read by more than one person at a time.
iii) The text can be searched.
iv) They can include multimedia and graphics, in color, at marginal cost.
v) They can be published more quickly than paper publications.
vi) They can be interactive; that is, they can foster an online exchange of ideas by e-mail.
vii) Have the ability to make hyperlinks, both internally and to other publications. This means
that readers can link directly to references cited in an article and also, with additional effort on
the part of publishers and indexers, to later articles that cite the article they are reading.
viii) Articles can be retrieved directly through links from abstracting and indexing databases.
ix) The content can be reproduced, forwarded, modified leading to possible problems with
copyright protection and preserving authenticity.
The main disadvantage is that, unless they are also printed on paper, they require
specialized equipment for reading.
a) E-journal: E-Journal is an all-electronic, peer-reviewed periodical in a specific field or in a
general field of interest. In the E-Journal environment the creation, transmission,
storage, interpretation, alteration and replication of electronic "text" including
"display" takes place in electronic form. Some electronic journals are online-only
journals; some are online versions of printed journals, and some consist of the online
equivalent of a printed journal, but with additional online-only material.
Some journals are subscription-based, or allow pay-per-view access. An increasing
number of journals are now available as open access journals, requiring no subscription. Most
working paper archives and articles on personal homepages are free, as are collections in
Institutional repositories and Subject repositories.
Most electronic journals are published both in HTML and Portable Document Format
(PDF) formats, but some are available in only one of the two. Some e-journals are available
over the internet while some others are distributed on CD-ROMs, or by way of e-mail.
b) E-book: An e-book also called eBook, ebook, electronic book, is an electronic (or digital)
equivalent of a conventional printed book and is a proprietary file formats.
Some e-books are produced simultaneously with the production of a printed book, though
in many instances they may not be put on sale until later. Often, e-books are produced from pre-
existing hard-copy books, generally by document scanning, sometimes with the use of Robotic
Scanners, having the technology to quickly scan books without damaging the original print
edition. Scanning a book produces an image file, which must then be converted into text format
by an Optical Character Recognition (OCR) program. Occasionally, an e-book may also be
produced by re-entering the text from a keyboard. As a newer development, sometimes only the
e-book form is produced by the publisher; it is usually possible technically to convert this to a
printed book by short-run printing.
A writer or publisher has many options when it comes to choosing a format for
production of e-book. Formats available include, but are by no means limited to image file (.png,
.jpg), Microsoft Word or plain text files (.doc or .txt), Rich Text Format (.rtf), Hyper Text
Markup Language (HTML) (.html), Open Electronic Book Package Format (OPF), Portable
Document Format (.pdf), etc.
The hardware device used to read books in digital format is known as an e-book device or
e-book reader. The e-book reader includes FlipViewer®, Haali Reader and FBReader, Plucker,
Acrobat Reader or Adobe Reader, Mobipocket (.prc), Cybook (Bookeen), iRex iLiad (based on
eInk), Sony Reader (based on eInk), eBookwise-1150 (based on former Gemstar technology),
Jinke Hanlin Reader (based on eInk), DNL Reader (http://www.dnaml.com/), eReader (formerly
Palm Digital Media) (.pdb), etc.
Among the first Internet-only publishers of new e-books were Boson Books, Hard Shell
Word Factory and Online Originals, all founded in the mid-1990s. Online Originals was the first
e-book publisher to win mainstream book reviews (in the London Times) and a nomination for a
major literary prize (the Booker Prize). Some of the free notable e-book repositories that are
available over the web are
i) Project Gutenberg (http://www.gutenberg.org/).
ii) Facsimile Books & other digitally enhanced Works from: The University of Georgia Libraries
(http://fax.libs.uga.edu/).
iii) The Internet Public Library Online Texts Collection
(http://www.ipl.org/div/subject/browse/hum60.60.00/)
iv) ManyBooks.net (http://manybooks.net/)
v) Econlib (http://www.econlib.org/)
vi) Higher intellect project (http://en.wikipedia.org/wiki/Higher_intellect_project)
vii) epalm.org (http://www.epalm.org)
viii) Explorion (http://explorion.net/).
vix) PocketPCBooks.net (http://www.pocketpcbooks.net/)
The main advantages of e-books are
i) Searching: Text can be searched, except when represented in the form of images.
ii) Take up Little Space: Hundreds (or thousands) may be carried together on one device,
Approximately 500 average e-books can be stored on one CD (equivalent to several shelves'
worth of print books).
iii) Royalties Generation for Authors: E-books can be offered indefinitely, with no “out of
print” date, allowing authors to continue to earn royalties indefinitely, and allowing readers to
find older works by favorite authors.
iv) Zooming Facility: Type size and type face may be adjusted.
v) Backup Copy: A backup can be kept in a remote place, so cannot be lost by fire, etc.
vi) Low Cost: Can be distributed at low cost since coloring copy also does not cost much.
vii) Speedy Distribution: Distributed instantly, allowing readers to begin reading at once,
without the need to visit a bookstore.
viii) Sharing: Can be simultaneously shared with many readers.
ix) Environmentally Viable: Economically and environmentally viable by cutting down on
paper and lumber production, economically viable by cutting down on ink production
x) Preservation: Does not wear over time, no risk of damage, vandalism, etc. on the pages.
Some of the disadvantages of e-books are:
i) Can be incompatible with the development of new hardware or software.
ii) To avoid damage or loss care must be taken in handling and storage of the books.
iii) Continuous reading can be harmful to the eyes.
iv) Always need some equipment to read the book.
Since the late 1990s, the many newcomers to e-book publishing have included most
major print publishers. At the same time, many established e-publishers started to offer print
versions of some of their titles. Thus the line between the two is fast blurring.
E-books have their own bestseller lists, including those compiled by IDPF and
Fictionwise. They even have two yearly awards for excellence in e-books. The longest-standing
and most inclusive of these is the EPPIE award, given by EPIC since 2000. The other is the
Dream Realm Award, first awarded to speculative fiction e-books in 2002.
Duties and Responsibilities of the Librarian
Duties and Responsibilities of the Librarian: The main duties and responsibilities of the
librarians are as follows
a) Policy Formulation: The librarian is to formulate and administer policies, rules and
regulation for the purpose of securing the most complete use of the library and to participate in
the formulation of educational policies of the parent organization.
b) Ex Officio Member: The librarian acts as an ex officio member of all the academic bodies of
the parent organization.
c) Library Budget: The librarian has the responsibility to prepare and execute the annual budget
of the library.
d) Library Documents: He is responsible for all the professional job related to selection,
acquisition, classification, cataloguing and maintenance of the library documents.
e) Library Service: The librarian is also responsible for providing the various types of services
such as CAS, SDI, Reference and also for creating reading habit.
f) Secretary of Library Committee: He acts as a secretary of the library committee where
he/she is responsible in preparing the agenda for the committee meeting by giving facts of each
item, to issue the library committee meeting notice and to keep the minutes of the library
committee meeting. The librarian is also responsible for keeping the library committee well
informed about the day to dayappening of the library.
vii) Library Representative: The librarian represents the library before the patrons of the library,
the general public etc and act as the chief executive of the library.
Document Delivery Service (DDS)
Document Delivery Service (DDS): The requested material for DDS may be articles from
journals, papers from conference proceedings, any other materials required for academic and
research purposes, depending on the availability. Modern computer and telecommunication
technology made it possible to transfer the electronic text of the document to long distances at
extremely fast speed.
a) Definition: DDS is concerned with the supply of document to the user on demand either in
original or its photocopies irrespective of the location and form of original document. The
Document Delivery Centre (DDC) on demand, deliver the copies of papers from learned
journals, conference proceedings and other material available in their collection. Every DDC will
also make the required effort to procure and supply the paper from other institution.
b) Need: The need for DDS felt due to ever increasing subscription cost of learned journal that
leads to a situation where no library can hold every item required to meet the needs of its user.
c) DDS Providers: The British Library Document Supply Centre, Boston and University
Microfilm International, Ann Arbor provide the DDS at international level.
In national level, INFLIBNET Centre in collaboration with the following universities
provides DDS. The role of INFLIBNET here is mainly to act as a catalyst in promoting this
service.
* Banaras Hindu University, Varanasi: For the region of Arunachal Pradesh, Assam, Bihar,
Manipur, Meghalaya, Nagaland, Sikkim, Tripura, Uttar Pradesh.
* University of Hyderabad, Hyderabad: For the region of Andhra Pradesh, Madhya Pradesh,
Orissa, West Bengal.
* Indian Institute of Science, Bangalore: For Karnataka, Kerala, Lakshadeep, Pondicherry,
Tamilnadu.
* Jawaharlal Nehru University, New Delhi: Covers Delhi, Haryana, Rajasthan.
* Punjab University, Chandigarh: Covers Chandigarh, Himachal Pradesh, Jammu & Kashmir,
Punjab.
* Tata Institute of Social Science, Mumbai: Includes Diu and Daman, Goa, Gujarat, Maharashtra.
d) Placing Request and Delivering the Material: The request, listing the items required with
complete bibliographical information are generally made using Email, normal letter by post, fax,
telephone (in case of urgency) or requests in person. The delivery is also made accordingly.
e) Charging Pattern: Some DDS services are provided on No Profit – No Loss Basis while
others are on profit. Each Document Delivery Centre makes best effort to deliver the requested
materials as early as possible. The fee for the service is charged depending on the type of
members and mode of delivery (electronic copies through email / print out copy of electronic
document / photocopy (Xerox) of printed material by hand scanning the printed page through
electronic / photocopy of printed material by Fax / Courier / speed post). The members and
associated member libraries of DDC can make the payment on supply of requested materials.
However, there is some time bound to settle the account. All non-member, commercial
organizations and individuals will have to pay in advance. To avoid the delay and paper work, in
many case it is suggested that a deposit account with a minimum of amount may be opened. In
today’s era many DDC also have the facility of online transfer of money through credit card or
internet banking while some others are still functioning by taking account of the Demand Draft,
cheque or by cash.
f) Let Us Sum Up: The requesting library / individual for the DDS will have to follow the
copyright regulations and therefore will have to give an undertaking in the request itself that the
requested material will be used only for academic and research purpose and not for any
commercial gains.
Discussion Groups
Discussion Groups: A group is an electronic mailing group that exchanges ideas and thoughts
on a wide variety of topics or on a single topic of mutual interest via email messages on an
Internet site. An individual subscriber can join a discussion group electronically, and all
messages sent to the group are distributed to the members by email. In mailing list the user posts
a query and every member gets a mail and a few would answer replying everyone through the
forum or personally to the user. In the web based group, there will be a space on web for the
users to discuss. Many groups have archives on the Web.
According to NetSetGo Marketing (www.netsetgo.com/glossary.php) a discussion group
is “a Web that supports interactive discussions by users. Users submit topics or responses by
entering text in a form”.
According to Vikont Solutions corp. (www.vikont.com/clients/glossary.htm) it is “a
particular section within the USENET system typically, though not always, dedicated to a
particular subject of interest. Also known as a newsgroup”.
A LIS-Server or mail server is a discussion group created to share ideas and knowledge
on as subject. Lisserver is the most common list server programme. Discussion groups are
usually created and monitored by some one with an interest in that subject and are open to
anyone. One can just join the list simply by sending an appropriate worded email request to the
list. The programme automatically reads your email address and adds one to the circulation list.
A message sent to the list is copied and then forwarded by email to every person who subscribes
to the list.
a) Features of a Discussion Group: A discussion group has the following features-
i) Subscribing to a Group: There are many groups over the web even in some minute topics of
interest. So, you have the choice of choosing the right group that meets your need and
expectation.
Determine the Mode of Subscription: Many of the users of discussion group or e-list now a days
are overwhelmed by the number of discussion group mails they receive demanding more
sophisticated approach to categorize and as a result many groups offer a "Digest" mode, where
one receives just one message a day with postings as attachments.
Message Filters: Most modern mail programs have message filters to direct all discussion group
postings into designated mail subfolders for reading and managing discussion groups much
easier.
ii) Composing and Posting a Quality Message: Before making a new query in the discussion
group please keep in mind the following things-
* Reading Posting Guidelines: Many discussion groups have their own specific guidelines for
what is allowed. Generally, after joining a group it sends the general posting guideline to the new
subscriber of the group and before posting a message to a discussion group all such posting
guidelines should be read carefully.
* Aware of the Aims and Objective of the Group: Only that message should be posted to a group
that meets its aim and objectives. Personal invitation like marriage and others should strictly be
avoided for being considered for posting and all others that are not related to the aim and
objectives of the groups in consideration.
* Avoid Duplication of Post: If you are a new member of a particular mail based discussion
group and the group has a search provision and an online archive, then before posting, it is
advisable to make a query search to find out whether such a posting is made earlier or not.
Duplication in query should be avoided.
* Stop Forwarding Your Subscription: Some people send the email and newsletter that they
received as a subscription from some other sites. Some even go further and copy and paste some
portion of some web sites periodically and post it to the group. Such bad practices must be
avoided.
* Aware of Audience: Think carefully about message’s audience. Before posting a message to a
discussion group keep it in mind that you are addressing millions of potential readers on the web
with different degree of expertise. Many groups have also archives on the Web and if it is then
the posting message may attract millions of reader in the coming days.
* Original Message: Your post or message should say something new and substantial. The
message that you are going to post will represent your profession, organization and yourself in a
wide public. In all cases, your participation in a discussion or contribution is judged by the
quality of your message or query. You can either create a good professional reputation, or
permanently damage your image and credibility by posting just a single message.
* Descriptive Title: Concise and descriptive subject titles should be used.
* Framing the Message: Take much time to phrase the message well, and spell correctly, use any
appropriate references if needed and recheck it before posting.
* Introduce Yourself in the Message: If you are new to the group, then it is better to introduce
yourself in front of the group member before the message or by giving all essential details about
you at the end of the message.
iii) Responding Properly: In posting a query or an answer or participating in a debate others
should be treated with respect; insult and sending an angry message should be avoided. Also as
message does not carry the clues of what is there in face-to-face conversation, so humor and
sarcasm can be easily misunderstood in a message and this should always be kept in mind.
Activity
Discussion Forum
Discussion Forum: An Internet forum, or message board or discussion forum, is a web
application for discussion that manages user-generated contents in a manner that is easy-to-
browse and search. Recent development in some popular implementations of forum software has
brought social network features and functionality. Such features include personal galleries, pages
as well as a social network like chat systems.
The forum consists of a tree like directory structure containing at the lowest end topics
(commonly called threads) and inside them posts. Logically forums are organised into a finite set
of generic topics (usually with one main topic) driven and updated by a group known as
members, and governed by a group known as moderators. By default to be an Internet forum, the
web application needs an ability to submit threads and replies. Forum software may sometimes
allow categories or subforums.
Each forum offers different features, from the most basic, providing text-only postings, to
more advanced packages, offering multimedia support and formatting code (usually known as
BBCode). Many forum packages can be integrated easily into an existing website to allow
visitors to post comments on articles.
Internet forum originated as the modern equivalent of a traditional bulletin board. Early
Internet forums could be described as a web version of a newsgroup or electronic mailing list
(many of which were commonly called Usenet) that were common from the late 1970s to the
1990s allowing people to post messages and comment on other messages.
One significant difference between forums and electronic mailing lists is that mailing lists
automatically deliver new messages to the subscriber, while forums require the member to visit
the website and check for new posts. Because members may miss replies in threads they are
interested in, many modern forums offer an "e-mail notification" feature, whereby members can
choose to be notified of new posts in a thread, and web feeds that allow members to see a
summary of the new posts using aggregator software.
The main difference between newsgroups and forums is that additional software, a
newsreader, is required to participate in newsgroups. Visiting and participating in forums
normally requires no additional software beyond the web browser.
The chronological older-to-newer view is generally associated with forums (the newer to
older being associated more akin to blogs).
Forums differ from chat rooms and instant messaging wherein participants do not have to
be online simultaneously to receive or send messages. Messages posted to a forum or Usenet are
publicly available for some time, which is uncommon in chat rooms that maintain frequent
activity.
The discussion forums are marketed through blog, posting message to online groups and
so on so that the user knows its existence and can arrive at it.
a) Forum Features: A discussion forum has the following features:
i) Registration: In the United States and some parts of Europe, most Internet forums require
registration to post. Registered users of the site are referred to as members and are allowed to
submit or send electronic messages through the web application. The process of registration
involves verification of one's age (typically over 12 as required so as to meet COPPA
requirements of American forum software) followed by a declaration of the terms of service
(other documents may also be present) and a request for agreement to said terms.
In areas such as China and Japan, registration is frequently optional and anonymity is
sometimes even encouraged. On these forums, a tripcode system may be used to allow
verification of an identity without the need for formal registration.
An unregistered user of the site is commonly known as a guest or visitor. A guest can
usually view the contents of the forum or use such features as read marking, but occasionally an
administrator will disallow visitors to read their forum as an incentive to become a registered
member.
ii) Subscription Options: A subscription is a form of automated notification integrated into the
software of most of the forums. It usually notifies either by email or on the site when the member
returns. The option to subscribe is available for every thread while logged in. Subscriptions work
with read marking, namely the property of unread which is given to the content never served to
the user by the software.
To stay with the post or comments many forums generated their RSS feed. RSS and
ATOM feeds allow a means of subscribing to the forum. Common implementations only allow
RSS feeds listing the last few threads updated for the forum index and the last posts in a thread.
iii) Rules and Policies on Forums: Forums are governed by a set of individuals, collectively
referred to as staff, made up of administrators and moderators, which are responsible for the
forums' conception, technical maintenance, and policies (creation and enforcing). Most forums
have a list of rules detailing the wishes, aim and guidelines of the forums’ creators. There is
usually a FAQ section containing basic information for new members and the people not yet
familiar with the use and principles of a forum. Forum rules are maintained and enforced by the
moderation team, but the users are allowed to help out via what is known as a report system.
iv) Thread: A thread (sometimes called a topic) is a collection of posts, usually displayed – by
default – from oldest to latest (options to order threads by other criteria are generally available).
A thread is defined by a title, an additional description that may summarize the intended
discussion and the comments. The members (sometimes even to anonymous users) are presented
with a web form to fill in requesting at the very least: a username (an alias), password, email and
validation of a CAPTCHA code and the post (message) or comments to existing message as
threads. So, a thread consists of the original post (OP) and the discussion or comments on it. A
thread can contain any number of posts, including multiple posts from the same members, even
if they are one after the other.
Post: A post is a user submitted message enclosed into a block containing the user's details and
the date and time it was submitted. Members are usually allowed to edit or delete their own
posts. Posts are contained in threads, where they appear as boxes one after another. The first post
starts the thread; this may be called the original post (OP). Posts that follow in the thread are
meant to continue discussion about that post, or respond to other replies; it is not uncommon for
discussions to be derailed.
Discussion: Forums prefer a premise of open and free discussion and often adopts de facto
standards. Most common topics on forums include questions, comparisons, opinion polls as well
as debates.
Attachment: An attachment can be almost any file. When someone attaches a file to a post they
are uploading the file to the forums' server. Forums usually have very strict limit on what can be
attached and what cannot be (among which the size of the files in question).
v) Invitation: Most forums have an option to send invitation by the members of the forum to
those who are still not members of the particular forum. Sometimes, the forum gives credit
(sometimes rewards are implied) to those who help the community to grow.
vi) Administrator: The administrators manage the technical details required for running the site.
As such, they may promote (and demote) members to moderators, manage the rules, create
sections and sub-sections, as well as perform any database operations (database backup etc).
Administrators also often act as moderators. Administrators may also make forum-wide
announcements, or change the appearance (known as the skin) of a forum.
This level of content manipulation is reserved for moderators or administrators on most
forums.
vii) Moderation Activity: The moderators are the users of the forum who are granted access to the
posts and threads of all members for the purpose of moderating discussion and also for keeping
the forum clean. Moderators also answer the users' concerns about the forum, general questions,
as well as respond to specific complaints. They also can do anything to lend a helping hand to a
user in need. Moderators themselves may have ranks: some may be given mod privileges over
only a particular topic or section, while others (called 'global' or 'super') may be allowed access
anywhere. Common privileges of moderators include: deleting, merging, moving, and splitting
of posts and threads, locking, renaming, stickying of threads, banning, suspending,
unsuspending, unbanning, warning the members, or adding, editing, removing the polls of
threads.
Assigning Privileges to Members: Many forums organise visitors and logged in members into
user groups. Privileges and rights are given based on these groups by the moderators.
Issuing Report about Post: Moderators issue a report when some post are not considered for
posting. It may be due to the fact that the post is against the rules or its offending contents. All
such posts are usually deleted.
Punishments to Members: The moderator sometime also gives punishment when rules are broken
by the users or members. First a warning is usually given; this is commonly in the form of a
private message. Subsequently, if the act is ignored and warnings do not work, the member is –
usually – first exiled from the forum for a number of days. Denying someone access to the site is
called a ban. Bans can mean the person can no longer log in or even view the site anymore. If the
offender, after the warning sentence, repeats the offense, another ban is given, usually this time a
longer one. Continuous harassment of the site eventually leads to a permanent ban. However, in
most cases this simply means the account is locked. In extreme cases where the offender – after
being permanently banned – creates another account and continues to harass the site,
administrators will apply an IP ban (this can also be applied at the server level): if the IP is static,
the machine of the offender is prevented from accessing the site. In some extreme circumstances,
IP range bans or country bans can be applied; however, this is usually for political, licensing or
other reasons.
Topic Locking: Sometimes if the topic is answered, it is locked; often a poster may request a
topic expected to draw problems to be locked as well, although the moderators decide whether to
grant it. In a locked thread, members cannot post anymore.
Deleting Thread: The old and not used topics may be deleted.
viii) Archive: Many discussion forums have online archive feature so that if the discussions are
old and not used at all it goes to the archive. The archive can be retrieved at any time using
search features or browsing through categories and sub-categories.
ix) Statistics Generation: Most forums keep track of a user's postcount. The postcount is a
measurement of how many posts a certain user has made. The users with higher postcounts are
often considered more reputable than the users with lower postcounts. However, some forums
have disabled postcounts in the hopes that doing so will reduce the emphasis on quantity over
quality of information.
A thread's popularity is measured on forums in reply (total posts minus one – the opening
post) counts. Some forums also track page views. Threads meeting a set number of posts or a set
number of views may receive a designation such as "hot thread" and be displayed with a
different icon compared to others threads. This icon may stand out more to emphasize the thread.
b) Concerns: Because of the volatile and random behavior of forum, unsocial behavior is easily
sprouted as people lose temper, especially if the topic is controversial. Poor understanding of
differences in values of the participants is a common problem on forums. Because replies to a
topic are often wording aimed at someone's point of view, discussion will usually go slightly off
into several directions as people question each others validity, sources and so on. Circular
discussion and ambiguity in replies can carry out arguments for several tens of posts of a thread
eventually ending when everyone gives up or another similar debate takes it over. The main
concerns are -
i) Troll: A troll is a user that repeatedly and intentionally breaches netiquette, often posting
derogatory or otherwise inflammatory messages about sensitive topics in an established online
community to bait users into responding, often starting flame wars.
ii) Sock Puppet: It refers to someone who is simultaneously registered under different
pseudonyms on a particular message board or forum.
iii) Forum Spamming: It is a breach of netiquette where users repeat the same word or phrase
over and over, but differs from multiple posting in that spamming is usually a willful act which
sometimes has malicious intent.
iv) Double Posting: It’s the posting the same message twice. Users sometimes post versions of a
message that are only slightly different, especially in forums where they are not allowed to edit
their earlier posts. Multiple posting instead of editing prior posts can artificially inflate a user's
post count. Multiple posting can be unintentional; a user's browser might display an error
message even though the post has been transmitted or a user of a slow forum might become
impatient and repeatedly hit the submit button.
v) Cross posting: A user may also send the same post to several forums, which is termed cross
posting. The term derives from Usenet, where crossposting was an accepted practice; however, it
causes problems in web forums.
vi) Bumping: When a member posts in a thread for no reason but to have it go to the top, it is
referred to as a bump or bumping.
vii) Flame Wars: When the discussion becomes heated and sides do nothing more than complain
and would not accept the differences in each other’s point of view, the discussion degenerates
into what is called a flame war. To flame someone means to go off-topic and attack the person
rather than their opinion. Likely candidates for flame wars are usually religion and socio-political
topics, or topics that discuss pre-existing rivalries outside of the forum.
c) Examples: People participating in an Internet forum may cultivate social bonds. A sense of
virtual community often develops around forums that have regular users.
i) 4chan (http://www.4chan.org/): 4chan is a simple image-based bulletin board where anyone
can post comments and share images. Different boards are dedicated to different topics, from
Japanese anime, manga, and culture to videogames, music, and photography. Users do not need
to register a username before participating in the community.
ii) Gaia Online (http://www.gaiaonline.com/forum/): Gaia Online was founded in 2003. Gaia's
forum is a place where millions of members gather to discuss random stuff, make new friends,
complain about life, argue about nothing, laugh at dumb pictures, discuss serious issues and/or
curse like sailors.
iii) Something Awful (http://forums.somethingawful.com/): Something Awful, often abbreviated
to SA, is a comedy website housing a variety of content, including blog entries, forums, feature
articles, digitally edited pictures, and humorous media reviews. The site is home to a collection
of Internet forums, which charge an initial registration fee of US$9.95 and fees ranging from
US$4.99 to US$29.99 for additional features. If a user is banned by administrators, the fees for
initial registration and all additional features are not reimbursed.
iv) The Student Room (http://www.thestudentroom.co.uk/): The Student Room (TSR), known
from 2001 until 2004 as UK Learning, is a United Kingdom-based internet forum for school and
university students. The site currently has over 300,000 members and more than nineteen million
posts.
v) Neowin Forums (http://www.neowin.net/forum/): Neowin.net is a technology news site that
actively focuses on Windows, Mac and Linux. The Neowin forums are Powered by Invision
Power Board forum software. Neowin has an active technology forum consisting of over
236,000 registered users and over 9 million posts.
Digital Millennium Copyright Act (DMCA)
Digital Millennium Copyright Act (DMCA): DMCA is a United States copyright law that
implements two 1996 treaties of the World Intellectual Property Organization (WIPO). Passed on
October 12, 1998 by a unanimous vote in the United States Senate and signed into law by
President Bill Clinton on October 28, 1998, the DMCA extended the reach of copyright, while
limiting the liability of the providers of on-line services for copyright infringement by their
users.
It criminalizes production and dissemination of technology, devices, or services intended
to circumvent measures (commonly known as digital rights management or DRM) that control
access to copyrighted works. It also criminalizes the act of circumventing an access control,
whether or not there is actual infringement of copyright itself. In addition, the DMCA heightens
the penalties for copyright infringement on the Internet.
Digital Media Preservation and Conservation Techniques
Digital Media Preservation and Conservation Techniques: Digital preservation is defined as a
long-term, error-free storage and management of digital information, with means for retrieval
and interpretation. Digital preservation requires more constant and ongoing attention than
preservation of other media. This constant input of effort, time, and money to handle rapid
technological and organizational advance is considered the main stumbling block for preserving
digital information. Indeed, while we are still able to read our written heritage from several
thousand years ago, the digital information created merely a decade ago is in serious danger of
being lost, creating a digital Dark Age. The following two terminologies are used in conjunction
with digital preservation
a) Digital Curation: Digital curation is the selection, preservation, maintenance, and collection
and archiving of digital assets. It is the process of establishing and developing long term
repositories of digital assets for current and future reference by researchers, scientists, and
historians, and scholars generally.
b) Digital Obsolescence: Digital obsolescence is a situation where a digital resource is no longer
readable because the physical media (modes of digital encoding, data –storage medium,
standards for encoding images and films), the reader required to read the media, the hardware, or
the software (operating systems and general or specialized software) that runs on it is no longer
available.
Digital technology is developing extremely fast, and one retrieval and playback
technology can become obsolete in a matter of years. When faster, more capable and cheaper
storage and processing devices are developed, the older version gets replaced almost
immediately. Even different computer "standards" are only for some time, and in the end are
always replaced by new versions of the software or completely new hardware.
Terms
Obsolescence: The state of
becoming out of fashion and no
longer useful.
Further, knowledge is individual to each person and does not depend upon humans to exist; when
it exists apart from information it can only be useful if it becomes a commodity or a resource.
Knowledge can only reside in an organic brain. As soon as it is objectified outside of a
biological organism it becomes disembodied information, capable of entering production similar
to a manufactured product or commodity. Some of the characteristics of knowledge are
i) It is dynamic, ever growing and continuing.
ii) It is contained in the subjective realm.
iii) It is structured, coherent and often of enduring significance.
iv) It is a stock, largely resulting from the flow, inputs of information.
v) It is the basis for action.
d) Wisdom: Wisdom is the distilled and integrated knowledge and understanding. It is the most
precious human capital in all developmental processes.
Cleveland, Ohio Association for System Management, 1979 has treated raw data from
“birth” into evaluated form as information, through maturity as knowledge, to “death” and
inclusion in the knowledge base. It may be noted in passing that in common social process, data,
information and knowledge are regarded as mutually sustaining elements at times distinctly
different, on occasions overlapping, and interchangeable. Both data and information have
intrinsic properties. While information is shareable, knowledge is individual to each person.
Again, information depends upon humans to exist but knowledge does not depend upon only
humans to exist.
Information is the aggregation and assemblage of data in a comprehensible form recorded
on paper or in some other medium and is capable of communication. Knowledge is the potential
for action on information. The information, knowledge and wisdom in their totality constitute
valuable human intellectual assets.
Data Warehouses
Data Warehouses: Data warehousing is defined as a process of centralized data management
and retrieval. A data warehouse is a place where data is stored for archival, analysis and security
purposes. A data warehouse is a central repository for all or significant parts of the data that an
enterprise's various business systems collect. The term was coined by W. H. Inmon. IBM
sometimes uses the term "information warehouse."
Usually a data warehouse is either a single computer or many computers (servers) tied
together to create one giant computer system. Typically, a data warehouse is housed on an
enterprise mainframe server. Data from various online transaction processing (OLTP)
applications and other sources is selectively extracted and organized on the data warehouse
database for use by analytical applications and user queries. Data warehousing emphasizes the
capture of data from diverse sources for useful analysis and access. Applications of data
warehouses include data mining, Web Mining, and decision support systems (DSS).
Data marts are smaller and less integrated data housings. They might be just a database
on human resources records or sales data on just one division.
a) Characteristics of Data Warehousing: Data warehouse includes the following
characteristics-
i) Subject Oriented: Subject oriented means that data is linked together and is organized by
relationships.
ii) Time Variant: Time variant means that any data that is changed in the data warehouse can be
tracked. Usually all changes to data are stamped with a time-date and with a before and after
value, so that you can show the changes throughout a period of time.
iii) Non Volatile: Non volatile means that the data is never deleted or erased. This is a great way
to protect your most crucial data. Because this data is retained, you can continue to use it in a
later analysis.
iv) Integrated: The data is integrated, which means that a data warehouse uses data that is
organizational wide instead of from just one department.
b) Advantages: The data warehouse helps the employees or end users to access and use the data
for reports, analysis and decision making. Using the data in a warehouse one can locate trends,
focus on relationships and understand more about the environment on which the business
operates.
Data warehouses also increase the consistency of the data and allow it to be checked over
and over to determine how relevant it is. Because most data warehouses are integrated, one can
pull data from many different areas of the business, for instance human resources, finance, IT,
accounting, etc.
c) Disadvantages: Data warehouse is time consuming to create and to keep operating. Many
time the current systems become incompatible with the data. So, the hardware and software
continuously need to be upgraded. Finally, security might be a huge concern, especially when the
data is accessible over an open network such as the internet. In such cases the data can be viewed
by the competitor or worse hacked and destroyed.
Data Mining
Data Mining: Data mining means the extraction of hidden predictive information from large
databases. It is the process of analyzing data from different perspectives and summarizing it into
useful information - information that can be used to increase revenue, cuts costs, or both. It is
"the nontrivial extraction of implicit, previously unknown, and potentially useful information
from data". Technically, data mining is the process of finding correlations or patterns among
dozens of fields in large relational databases. Data Mining is also called as data or knowledge
discovery.
Data mining software is one of a number of analytical tools for analyzing data. It allows
users to analyze data from many different dimensions or angles, categorize it, and summarize the
relationships identified. It uses machine learning, statistical and visualization techniques to
discovery and present knowledge in a form which is easily comprehensible to humans. Data
mining tools predict future trends and behaviors, allowing businesses to make proactive,
knowledge-driven decisions. It enhances the value of existing information resources.
h) Search / Retrieval via URL (SRU): SRU is a standard XML-focussed search protocol for
Internet search queries, utilizing Contextual Query Language (CQL), a standard syntax for
representing queries. Website: http://www.loc.gov/standards/ or
http://www.loc.gov/standards/sru/
i) Free Software Foundation (FSF): The Free Software Foundation (FSF) is a non-profit
corporation founded by Richard Stallman in October 1985 to support the free software
movement, a copyleft-based movement which aims to promote the universal freedom to create,
distribute and modify computer software. Website: http://www.fsf.org/
j) Open Source Software (OSS): The Open source software (OSS) is defined at the website
www.opensource.org as Open source promotes software reliability and quality by supporting
independent peer review and rapid evaluation of source code. To be certified as open source, the
license of a program must guarantee the right to read, redistribute, modify, and use it freely.
Open source software is normally created and maintained by developers crossing institutional
and national boundaries, collaborating by using internet-based communications and
development tools. In case of OSS, the developers take personal pride in seeing their working
solutions adopted but not gaining profit drive.
k) Copyleft Licenses: Copyleft is a general method for making a program (or other work) free,
and requiring all modified and extended versions of the program to be free as well. It means
releasing the content giving with permission for anyone to use, copy, and distribute, either
verbatim or with modifications, either gratis or for a fee. The GNU General Public Licence,
originally written by Richard Stallman, was the first copyleft licence to see extensive use, and
continues to dominate the licencing of copylefted software. Creative Commons, a non-profit
organization founded by Lawrence Lessig, provides a similar licence called ShareAlike.
Computer Storage
Computer Storage: The fundamental components of a general-purpose computer are Input
Unit, Central Processing Unit (CPU) and Output Unit. The CPU consists of Arithmetic and
Logic Unit (ALU), Control Unit and Memory. If memory is removed, the device we had would
be a simple digital signal processing device (e.g. calculator, media player) instead of a computer.
Computer storage, computer memory, and often casually memory refer to computer
components, devices and recording media that retain digital data, to be used for computing at
some interval of time. It is one of the fundamental components of all modern computers, and
coupled with a CPU. Some of the commonly associated terminologies related to computer
storage are discussed below
a) Memory Unit: Memory is the work space area of a computer system where data and
instructions are stored. Text, numbers, pictures, audio, and nearly any other form of information
can be converted into a binary digits i.e. ‘1’ or ‘0’ and a digital computer can understand
information only in terms of ‘0’s and ‘1’s.
i) Bit: A binary digit i.e. ‘0’s and ‘1’s is called a bit and it can be define as an electronic signal,
which is either On ‘1’ or Off ‘0’. It is also the smallest unit of information the computer uses.
ii) Byte: A group of 8 bits is called a byte. There can be 256 different combinations possible in
Byte (8 bit) and each character typed consumes one byte. The most common unit of storage is
the byte.
Bit = “0” and “1”.
1 Byte = 8 bits = 1 character.
1024 Byte= 1 Kilo Byte
1024 Kilo Byte= 1 Mega Byte.
1024 Mega Byte= 1 Giga Byte, and so on.
b) Storage Capacity: It is the total amount of stored information that a storage device or
medium can hold. It is expressed as a quantity of bits or bytes (e.g. 750 megabytes).
c) Storage Density: It refers to the compactness of stored information. It is the storage capacity
of a medium divided with a unit of length, area or volume (e.g. 1.2 megabytes per square
centimeter).
d) Latency: It is the time needed to access a particular location in storage. The relevant unit of
measurement is typically nanosecond for primary storage, millisecond for secondary storage,
and second for tertiary storage. It may make sense to separate read latency and write latency, and
in case of sequential access storage, minimum, maximum and average latency.
e) Throughput: It is the rate at which information can read from or written to the storage. In
computer storage, throughput is usually expressed in terms of megabytes per second or MB/s,
though bit rate may also be used. As in the case of latency, read rate and write rate may also be
differ in throughput.
f) Word length: The number of bits that a computer can process at a time in parallel is called its
word length. It is nothing but the measure of the computing power of a computer. Commonly
used word lengths are 8, 16, 32 or 64 bits.
1. Storage Media: Various forms of storage, based on various natural phenomena, have been
invented. So far, no practical universal storage medium exists, and all forms of storage have
some drawbacks. Therefore a computer system usually contains several kinds of storage, each
with an individual need and purpose.
A) Types of Storage Media Based on Memory Hierarchy and Distance from CPU: Based on
memory hierarchy, or distance from the central processing unit the memory or computer storage
can be categorize as primary, secondary, tertiary and network storage.
a) Primary Storage: Primary storage or internal memory is directly connected to the central
processing unit of the computer. It is used to store data that is likely to be in active use and is
typically very fast, as in the case of RAM. It is present for the CPU to function correctly.
Primary storage can be accessed randomly, that is, accessing any location in storage at any
moment takes the same amount of time. A particular location in storage is selected by its
physical memory address. That address remains the same, no matter how the particular value
stored there changes. The primary storage sometimes also refers as memory (main storage /
primary storage).
Today, primary storage is typically random access memory, a type of semiconductor
memory. The primary storage typically consists of three kinds of storage:
The processor registers is internal to the central processing unit. Registers contain
information that the arithmetic and logic unit needs to carry out the current instruction. They are
technically the fastest of all forms of computer storage, being switching transistors integrated on
the CPU's silicon chip, and functioning as electronic "flip-flops".
The other two types are Cache Memory and Main Memory.
b) Secondary and Off-Line Storage: Secondary storage, or external memory supplements the
main memory and it requires the computer to use its input / output channels to access the
information. Secondary storage is used for long-term storage of persistent information.
Secondary storage is also known as “mass storage devices” or “auxiliary memory” and is much
slower then primary memory.
The need of secondary storage devices are felt due to the following reasons-
i) Limited storage capacity in primary storage devices: The capacity of primary storage devices
is limited so to store data and programs that are too large to fit into the random-access memory
at one time, we require the auxiliary storage devices.
ii) To make blank spaces in primary storage devices: If the capacity of the primary storage
devices becomes full of information then we will be unable to use it for our day to day activities.
iii) For easy transportation: Primary memories are not portable in nature, so for easy
transportation we require auxiliary storage devices.
iv) Security against physical calamities: If primary memory is destroyed due to some physical
calamities or by some accident computer crashes and the data in it cannot be recovered then the
data in the secondary storage devices can be used for backup utility.
v) Multiple copies: To obtain multiplied copy of our information we require secondary storage
devices.
Some of the characteristics of secondary storage devices are-
i) Storage medium can be easily removed from the computer system.
ii) It uses input / output channel of the computer system to access the information.
iii) Mainly used for data transfer and archival purposes.
iv) The cost of secondary memory is very less as compared to primary memory.
v) The secondary storage is more permanent in nature, non volatile and secures method for
storing programs and data compared to RAM memory.
vi) The Secondary or mass storage is typically of much greater capacity than primary storage
(main memory).
In modern computers, Hard Disks, CDs, DVDs, memory cards, flash memory devices
including "USB drives", Zip disks and magnetic tapes are commonly used for off-line mass
storage purposes. "Hot-pluggable" USB hard disks are also available. Off-line storage devices
used in the past include punched cards, microforms, and removable Winchester disk drums.
i) Hard Disks: A hard disk is a fixed unit placed within the cabinet of the computer system and
it can not be removed like a CD. It consists of rigid circular platters of magnetizable material
sealed in a metal box with associated read/write heads. In modern computers, hard disks are
usually used for mass storage and it is no removable magnetic media as it is usually internal to
the computer. The time taken to access a given byte of information stored on a hard disk is
typically a few thousandths of a second, or milliseconds. By contrast, the time taken to access a
given byte of information stored in random access memory is measured in thousand-millionths
of a second, or nanoseconds. So, hard disks are typically about a million times slower than
memory. This also illustrates the very significant speed difference which distinguishes solid-state
memory from rotating magnetic storage devices. In today’s context 160 GB is of hard disk
storage is minimal for personnel computer; one can also go for even 1 terabytes.
ii) Optical Storage Devices: The computer storage devices in which data is placed and / or
retrieved by means of a focused optical beam is called as optical storage device. Optical
technology involves the use of lasers (i.e. by burning microscopic “pits” to represent 1s and 0s)
to enable or recode the data from an optical laser disk. In case of optical disk nothing touches the
encoded portion and so not worm out by the playing process and last long. Rotating optical
storage devices, such as CD and DVD drives, are typically even slower than hard disks, although
their access speeds are likely to improve with advances in technology. The term Worm drives/
device, optical disk libraries, jukebox / optical jukebox, write once read only device/ drives etc.
are synonymous with optical storage devices.
- Optical Disk: The laser optical disks are hard metal disk ranging in size from 4.72 inches to 14
inches. They were originally developed as a compact disk for audio and video application. Most
optical disks are read only storage devices. Eg. of optical disk includes Jukebox, DVD, CD, etc.
- Jukebox: A jukebox is an optical disk device that can automatically load and unload optical
disk and provide as much as 500 GB of near line information. The device is often called as
optical disk – libraries, Robotic drives or autochangers.
- DVD: DVD (commonly known as "Digital Versatile Disc" or "Digital Video Disc") is an
optical disc storage media format that can be used for data storage, including movies with high
video and sound quality. DVDs resemble Compact Discs as their diameter is the same (120 mm
(4.72 inches) or occasionally 80 mm (3.15 inches) in diameter), but they are encoded in a
different format and at a much higher density. A DVD typically may contain at least 4.4 GiB of
data, nearly 7 times the amount of a CD-ROM and about 20 times faster than a CD-ROM. There
are several possible successors to DVD being developed by different consortiums:
Sony/Panasonic's Blu-ray Disc (BD), Toshiba's HD DVD and Maxell's Holographic Versatile
Disc (HVD). However, as reported in a mid 2005 issue of Popular Mechanics, it is not yet clear
which technology will win the format war over DVD. HD DVD discs have a lower capacity than
Blu-ray Discs (15 GB vs. 25 GB for single layer, 30 GB vs. 50 GB for dual layer). Other
speculations as to which format will win include Blu-ray Disc's larger hardware vendor and
movie studio support, and HD-DVD's faster read times.
- CD-ROM: CD-ROM is an abbreviation for "Compact Disc Read-only memory. It is a small
plastic disk used to store information digitally. The disk is covered with a transparent plastic
coating and is played on machine that uses laser to read the pattern of pitted and unpitted areas
on the disk’s surface. Since nothing touches the encoded portion the CD’s is not worn out by the
playing process. It is possible to produce composite CDs containing both data and audio with the
latter capable of being played on a CD player, whilst data or perhaps video can be viewed on a
computer. These are called Enhanced CDs. The standard CD-ROM holds 650 or 700 MiB of
data. The CD-ROM is popular for distribution of software, especially multimedia applications,
and large databases. A CD weighs less than 30 grams.
- Optical Tape: The optical tape is similar in appearance to a magnetic tape, but data are stored
by optical laser technique. Like other optical media the optical tape is also read only data storage
device.
- Optical Card: Optical cards are also called as laser card. It is in the size of a credit card and
has an optical laser encoded strip that can store approximately 2 MB of data.
- USB Pen Drive: USB Pen Drive is a small keyring-sized device that can be used to easily
transfer files between USB-compatible systems. It comes with a very different size and
capacities.
c) Tertiary and Database Storage: Database storage is a system where information in
computers is stored in large databases, data banks, data warehouses, or data vaults. It involves
packing and storing large amounts of storage devices throughout a series of shelves in a room,
usually an office, all linked together. The information in database storage systems can be
accessed by a supercomputer, mainframe computer, or personal computer. Databases, data
banks, and data warehouses, etc, can only be accessed by authorized users. In Tertiary or
database storage a robotic arm will "mount" (connect) or "dismount" off-line mass storage media
according to the computer operating system's demands. Tertiary storage is used in the realms of
enterprise storage and scientific computing on large computer systems and business computer
networks, and is something a typical personal computer user never sees firsthand.
d) Network Storage: Network storage is any type of computer storage that involves accessing
information over a computer network. Network storage arguably allows to centralize the
information management in an organization, and to reduce the duplication of information.
Network storage includes:
i) Network-Attached Storage: It is secondary or tertiary storage attached to a computer which
another computer can access at file level over a local-area network, a private wide-area network,
or in the case of online file storage, over the Internet.
ii) Storage Area Network: It provides other computers with storage capacity over a network,
the crucial difference between Network-Attached Storage (NAS) and Storage Area Networks
(SAN) is the former presents and manages file systems to client computers, whilst a SAN
provides access to disks at block addressing level, leaving it to attaching systems to manage data
or file systems within the provided capacity.
iii) Network Computers: Network computers are computers that do not contain internal
secondary storage devices. Instead, documents and other data are stored on a network-attached
storage.
Confusingly sometimes primary storage can be used to refer to local random-access disk
storage, which should properly be called secondary storage. If this type of storage is called
primary storage, then the term secondary storage would refer to offline, sequential-access
storage like tape media.
B) Based on Volatility of Information: Based on volatile and non volatile nature of information
stored in the memory, memory can be of the following types-
a) Volatile Memory: It requires constant power to maintain the stored information. It is
typically used only for primary storage, but at the same time primary storage is not necessarily
volatile, even though today's most cost-effective primary storage technologies are volatile. Non-
volatile technologies have been widely used for primary storage in the past and may again be in
the future.
b) Dynamic Memory: It is volatile memory that demands to be periodically refreshed, or read
and rewritten to store information without modifications.
c) Non-volatile Memory: The Non volatile memory retains the stored information even if it is
not constantly supplied with electric power. It is suitable for long-term storage of information,
and therefore used for secondary, tertiary, and off-line storage.
C) Based on Access: Based on the access provision, memory can be divided into the following
categories-
a) Random Access: In Random access one can access any point at random i.e. without passing
through intervening points. It means that any location in storage can be accessed at any moment
without wasting much time. This makes random access memory well suited for primary
storage.Example: Magnetic disk, Optical disk, Zip disks
b) Sequential Access: In sequential access the data stored in the media can only be read in
sequence and to get to a particular point on the media one has to go through all the preceding
points. It means to access a piece of information takes a varying amount of time, depending on
which piece of information was accessed last. The device may need to seek (e.g. to position the
read/write head correctly), or cycle (e.g. to wait for the correct location in a revolving medium to
appear below the read/write head). Example includes magnetic tapes and such other media.
D) Based on Ability to Change Information: Based on the provision of modifying the
information, computer memory can be of the following types-
a) Read / Write Storage, or Mutable Storage: It allows information to be overwritten at any
time. A computer without some amount of read/write storage for primary storage purposes
would be useless for many tasks. Modern computers typically use read/write storage also for
secondary storage. Slow write, fast read storage is read/write storage which allows information
to be overwritten multiple times, but with the write operation being much slower than the read
operation. Examples include CD-RW.
b) Read Only Storage: It retains the information stored at the time of manufacture, and write
once storage (WORM) allows the information to be written only once at some point after
manufacture. These are called immutable storage. Immutable storage is used for tertiary and off-
line storage. Examples include CD-R.
E) Addressability of Information: Based on the provision of addressability of information,
computer memory can be of the following types-
a) Location-addressable Storage: Here, each individually accessible unit of information in
storage is selected with its numerical memory address. In modern computers, location-
addressable storage usually limits to primary storage, accessed internally by computer programs,
since location-addressability is very efficient, but burdensome for humans.
b) Content-addressable Storage: Here, each individually accessible unit of information is
selected with a hash value or a short identifier with number? Pertaining to the memory address
the information is stored on. Content-addressable storage can be implemented using software
(computer program) or hardware (computer device), with hardware being faster but more
expensive option.
c) File System Storage: Here, information is divided into files of variable length, and a
particular file is selected with human-readable directory and file names. The underlying device is
still location-addressable, but the operating system of a computer provides the file system
abstraction to make the operation more understandable. In modern computers, secondary, tertiary
and off-line storage use file systems.
F) Based on Technologies, Devices and Media: Previously paper tape and punch cards have
been used to store information for automatic processing since the 1890s, long before general-
purpose computers existed. Information was recorded by punching holes into the paper or
cardboard medium, and was read by electrically (or, later, optically) sensing whether a particular
location on the medium was solid or contained a hole. Williams’s tube used a cathode ray tube,
and Selectron tube used a large vacuum tube to store information. These primary storage devices
were short-lived in the market, since Williams tube was unreliable and Selectron tube was
expensive. Delay line memory used sound waves in a substance such as mercury to store
information. Delay line memory was dynamic volatile, cycle sequential read/write storage, and
was used for primary storage. In modern times the following types of devices are widely used.
a) Magnetic Storage: Magnetic storage uses different patterns of magnetization on a
magnetically coated surface to store information. Magnetic storage is non-volatile. The
information is accessed using one or more read/write heads. Since the read/write head only
covers a part of the surface, magnetic storage is sequential access and must seek, cycle or both.
In modern computers, the magnetic surface takes the forms of Magnetic disk, Floppy disk (used
for off-line storage), Hard disk (used for secondary storage), Magnetic tape data storage (used
for tertiary and off-line storage; In early computers, magnetic storage was also used for primary
storage in a form of magnetic drum, or core memory, core rope memory, thin film memory,
twistor memory or bubble memory. Also unlike today, magnetic tape was often used for
secondary storage.)
b) Semiconductor Storage: Semiconductor memory uses semiconductor-based integrated
circuits to store information. A semiconductor memory chip may contain millions of tiny
transistors or capacitors. Both volatile and non-volatile forms of semiconductor memory exist. In
modern computers, primary storage almost exclusively consists of dynamic volatile
semiconductor memory or dynamic random access memory. Since the turn of the century, a type
of non-volatile semiconductor memory known as flash memory has steadily gained share as off-
line storage for home computers. Non-volatile semiconductor memory is also used for secondary
storage in various advanced electronic devices and specialized computers.
c) Optical Disc Storage: Optical disks are non-magnetic auxiliary storage devices that resemble
audio compact disks. Optical disc storage uses tiny pits etched on the surface of a circular disc to
store information, and reads this information by illuminating the surface with a laser diode and
observing the reflection. Optical disc storage is non-volatile and sequential access. It takes the
forms of CD, CD-ROM (or compact disk, read-only memory), DVD (Read only storage, used
for mass distribution of digital information such as music, video, computer programs etc), CD-R,
DVD-R, DVD+R (Write once storage, used for tertiary and off-line storage), CD-RW, DVD-RW,
DVD+RW, DVD-RAM (Slow write, fast read storage, used for tertiary and off-line storage),
Blu-ray Disc (BD), HD DVD, Ultra Density Optical (UDO), Professional Disc for DATA (PDD
or ProDATA). Among the list Holographic Versatile Disc (HVD), Phase-change Dual is also can
be proposed. Recordable CD-ROM disks, called WORM (write-once/read-many) are becoming
an affordable alternative to tapes and hard disk, primarily for archival storage purposes. A single,
small CD-ROM disk can hold more information than 1,000 floppy disks.
i) Magneto-optical Disc Storage: Magneto-optical disc storage is optical disc storage where the
magnetic state on a ferromagnetic surface stores information. The information is read optically
and written by combining magnetic and optical methods. Magneto-optical disc storage is non-
volatile, sequential access, slow write, fast read storage used for tertiary and off-line storage.
ii) Ultra Density Optical Disc Storage: An Ultra Density Optical disc or UDO is a 5.25" ISO
cartridge optical disc encased in a dust-proof caddy which can store up to 30 GB of data.
Utilizing a design based on a magneto-optical disc, but utilizing phase change technology
combined with a blue violet laser, a UDO disc can store substantially more data than a magneto-
optical disc or MO, because of the shorter wavelength (405 nm) of the blue-violet laser
employed. MOs use a 650-nm-wavelength red laser. Because its beam width is shorter when
burning to a disc than a red-laser for MO, a blue-violet laser allows more information to be
stored digitally in the same amount of space. Current generations of UDO store up to 120 GB,
though up to 500 GB has been speculated as a possibility for UDO.
iii) Optical Jukebox Storage: Optical jukebox storage is a robotic storage device that utilizes
optical disk device and can automatically load and unload optical disks and provide terabytes of
near-line information. The devices are often called optical disk libraries, robotic drives, or auto
changers. Jukebox devices may have up to 1,000 slots for disks, and usually have a picking
device that traverses the slots and drives. The arrangement of the slots and picking devices
affects performance, depending on the space between a disk and the picking device. Seek times
and transfer rates vary depending upon the optical technology. Jukeboxes are used in high-
capacity archive storage environments. HSM is a strategy that moves little-used or unused files
from fast magnetic storage to optical jukebox devices in a process called migration. If the files
are needed, they are migrated back to magnetic disk.
Computer
Computer: The industrial machine eliminates muscular effort from production; just like that the
computing machine eliminates clerical and computational effort from administration, research,
etc. The word “computer” is derived from the word “compute”, which means to calculate. It is an
electronic device that can perform a variety of operations according to a set of instructions called
program. It is “a device that receives, processes and presents information” (McGraw Hill, 1997,
p. 270). A computer is a device that solves problems by applying prescribed operation on data
entered into it. (Encyclopaedia Britannica, 1991, p. 638). A computer can also be defined as a set
of interacting elements, responding to input so as to produce desire output.
A computer is a machine that manipulates data according to a set of instructions. The first use of
the word "computer" was recorded in 1613, referring to a person who carried out calculations, or
computations, and the word continued to be used in that sense until the middle of the 20th
century. From the end of the 19th century onwards though, the word began to take on its more
familiar meaning, describing a machine that carries out computations.
Nearly all modern computers implement some form of the stored program architecture,
making it the single trait by which the word "computer" is now defined. By this standard, many
earlier devices would no longer be called computers by today's definition, but are usually
referred to as such in their historical context. The technologies used in computers have changed
dramatically since the first electronic, general-purpose computers of the 1940s, but most still use
the Von Neumann architecture. The design made the universal computer a practical reality.
Vacuum tube-based computers were in use throughout the 1950s. Vacuum tubes were
largely replaced in the 1960s by transistor-based computers. When compared with tubes,
transistors are smaller, faster, cheaper, use less power, and are more reliable. In the 1970s,
integrated circuit technology and the subsequent creation of microprocessors, such as the Intel
4004, caused another generation of decreased size and cost, and another generation of increased
speed and reliability. By the 1980s, computers became sufficiently small and cheap to replace
simple mechanical controls in domestic appliances such as washing machines. The 1980s also
witnessed home computers and the now ubiquitous personal computer. With the evolution of the
Internet, personal computers are becoming as common as the television and the telephone in the
household.
Experts don’t agree on computer classification because computer technology is changing so fast
that within the span of a month, when a new system comes out, it is faced with two potential
factors- one costs the same and has a much higher performance and the other has the same
performance but costs much less. Thus, a recently introduced smaller system can outcome
(outperform) the large model of a few years ago and a new PC can do the work of an earlier mini
at a much lower cost.
This is the Computer Age and these machines are beginning to affect our lives in many
ways. There are so many applications of computers. The computer era appears before us with the
promise of new and improved ways of thinking, living and working. Computers are all around us
and avoiding them is virtually impossible. We have been exposed to the world of computer hype,
computer advertisements and computer headlines. We interact with computers in our daily lives -
whether we are at the cinemas, the school, or the public library.
Components of Information System
Components of Information System: Information System consists of a number of organs or
components. These organs or components work in harmony to achieve the define purposes. The
main components of Information Systems are
i) Libraries
ii) Documentation Centres
iii) Information Centres
iv) Data Banks
v) Data Centres
vi) Information Analysis Centres
vii) Referral Centres
viii) Clearing Houses
ix) Translation Centres, etc.
1. Libraries: Libraries are by far the oldest institutions charged with the responsibility of
collecting, storing and disseminating of information. Library is a collection of books or other
written or printed materials, as well as the facility in which they are housed and served the reader
within an institution that is responsible for their maintenance. According to Ranganathan, the
father of library science in India “a library is a public institution or establishment charged with
the care of collection of books, the duty of making them accessible to those who require the use
of them and the task of converting every person in its neighborhood into a habitual library goers
and reader of books.”
Libraries are established by the government, academic institutions or by some other
special organizations. Libraries can be grouped into three major divisions i.e Public (State
Central Library, District Library, Sub divisional Library, Rural Library), Academic (University
Library, College Library), School and Special (Libraries attached to industries, Doordarshan
Kendra, All India Radio, etc).
a) Collections: In ancient day libraries gathered huge collection of manuscripts and preserved
them most efficiently for the posterity. Modern libraries may contain a wide range of materials,
including manuscripts and pamphlets, posters, photographs, motion pictures, and videotapes,
sound recordings, and computer databases in various forms.
b) Services: Libraries are the carriers of information from one generation to the next generation.
Most of the new technology based information businesses are still largely dependent on the
library for their survival which includes information broker, consultants, referral centre. In the
days of IT also libraries continue to serve millions of grateful users in new and improved ways
and it is hoped that in neat future also it will be the only affordable source of information.
The change in structure of libraries comes as an information system that consists of a
number of organs or components. These organs or components work in harmony to achieve the
define purposes. It is advantageous to discuss the changing role of library and information
centers on the basis of such information unit or change in structure of the libraries.
2. Documentation Centres: ASLIB adopted the definition of the term documentation for the
Journal of Documentation in 1945 as “recording, organization and dissemination of specialized
knowledge”. Late Dr. S. C. Bradford defines it as “the art of documentation is the art of
collecting, classifying and making readily accessible the records of all kinds of intellectual
activities”.
a) Origin of Documentation Centres: Books were not able to communicate latest scientific
thought as a result importance of scientific periodicals had increased. With the acceleration of
research scientific periodicals gained further importance. Along with the scientific periodicals
new kind of literature like conference proceedings, annual reviews, patents, standards and
specification, theses, secondary periodicals like indexing and abstracting journals, directories,
research reports, etc. started appearing in big way. Further these paper based information sources
are supplemented by CD, DVD, etc. As a result libraries started acquiring all these materials
along with books. To have a comprehensive term for all these media of communication
“Documentation” was brought into vogue. The reader for this kind of new literature steadily
increases but the nature of complexity of information sources led to the demand of services that
are outside the domain of traditional libraries and the traditional library techniques were found to
be unsuitable hence, a new breed of organization known as documentation centres paved the
way.
b) Services: Documentation centres find out new vistas in serving the need of the user. It gives
emphasis towards provision of information contained in document rather than serving the
document themselves. It analyses the content of the documentation in finer details, provide
indexing, abstracting, union catalogue, translation, etc. services to meet the need of the specialist
users. Another basic function of any documentation centres is that it brings to the notice of
specialist user, current and recent literature of value to them. Services of documentation centres
are designed to satisfy the existing and anticipated needs of its users. The main purposes served
by these units are
- To answer the queries;
- To help in finding the primary document;
- To identify as accurately as possible all information of potential interest to users;
- To see that the user receive the information.
3. Information Centres: An information centre can be defined as “an organization that
a) Select, acquire stores and retrieve specific information in response to requests.
b) Announces, abstract, extract and indexes information and
c) Disseminate information in response to requests from documents or in anticipation”.
Meltzer defines the information centre as “The Special library with added functions of
analyzing and synthesizing information needed by management, staff and the technical personnel
of the organization”. Thus information centres gives emphasis towards the provision of
information contained in the document rather than document themselves which is the main
consideration of traditional libraries.
A library handles and provides address of a document containing information but an
information centre gives information that is inside the document and also processes and
disseminates it. The information centre differs from the library in following main areas
i) Degree of delegation by the user i.e. the task of searching and evaluating information is dome
by the staff
ii) Exercise of judgment and evaluation as to the importance of the retrieved material in relation
to the client’s request
iii) The giving of information itself rather than document.
iv) The processing of search input into a variety of search products
v) Provides information to not only user of parent organization but also outside the organization
too.
vi) Not only acquire, process, store and retrieve information (the library function) but also reduce
analyse and present information / data.
4. Data Banks: Data Banks are usually concerned with a broader field. They are very precise
grids to extract the raw data from data collection and the relevant literature which they arrange in
structured files so as to be ready for subsequent processing to answer user queries. The essential
characteristic of data bank is storing information in a form (so data should be in a machine
readable files i.e. for storing and retrieving of data computer should be used) which will allow
continuous updating, augmentation and approach from different points of view and which has the
capacity of supporting simultaneously a number of user at remote locations. To use the analogy
of a bank, a user can deposit or withdraw from several branches.
Satmana defines a data bank as an open information system with sets of data known as
files. It is composed of the following elements
i) The basic files known as data base.
ii) A filing system that makes to integrate data from different files, relative to the same entities
iii) A data processing system that allows users to extract relevant information from the files
adopted to their needs and in a form suited to their decision pattern.
Data centre and data banks are dissimilar only regarding the subjects they deals and type
of data they handle. Simply stated data centres handle only numerical data and mostly for science
and technology. Data banks are multidisciplinary and deal with all types of data particularly
administrative, statistical, techno-economics, census and survey, and similar other that are
produced by several institutions. Data banks handle data only while data centres handle data
themselves or literature about data.
5. Data Centres: According to UNESCO a data centre “constitutes an organization handling
quantitative numerical data” Such centers take the primary function of collecting, organizing,
and disseminating data (mainly numerical) and also provide a measurement service and are in a
position to advance relevant measurement techniques. They store data on a narrow field of
specification. Data centres try to collect arrange and store numerical data pertaining to a specific
subject field or to answer specific queries. Data centre activities are anticipatory operations
planned keeping in view the requirements of its user. It also checks systematically all available
data and organizes them into a number of categories for the purpose of showing the current state
of knowledge together with comments on the precision or reliability of the data in regard to the
various aspects of a product or phenomena. It may be stated here that the activities of a data
centre may comprise of the following
i) Data Collection
ii) Data Control
iii) Data Codification
iv) Data Organization ans structuring into a database
v) Data Retrieval
Example of data centre include National Data Centre for Crystallography, University of
Madras, India.
6. Information Analysis Centres: The COSATI standing panel wrote the following
comprehensive definition of Information Analysis Centre (IAC) “An information analysis centre
is a formally structured organizational unit, specifically (but not necessarily exclusively)
established for the purpose of acquiring, selecting, storing, retrieving, evaluating, analyzing an
synthesizing a body of information and / or data in a clearly defined specialized field or
pertaining to a specified mission with intent of compiling, digesting, repackaging or otherwise
organizing and presenting pertinent information and / or data in a form most authoritative, timely
and useful to a society of peers and management”.
The key activities of IAC s are analysis, interpretation, synthesis, evaluation and
repackaging of information carried out by subject specialists, resulting in the production of new,
evaluated information in the form of critical reviews, state of art, monographs or data
compilation as well as substantive, evaluated responses to queries for the purpose of assisting a
community of users more broadly representative than the staff of the parent institutes of
laboratories.
These centres have to closely monitor the literature produced in the field, evaluate the
utility of each piece of information so gathered and the information are communicate to the users
in a directly usable form. The results of analysis are communicated either through a regular
publication or by way of sporadic reports. It is very much essential that these centres should
verify the information so gathered with regard to the validity, reliability and accuracy before
dissemination.
7. Referral Centres: These do not provide the user with the documents. Instead it refers or
directs them to the source from where they can get the data or the documents. Mostly to
secondary publication, information centres, professional organizations, research institutions,
clearing houses and individual scientist, etc. They maintain files of sources, directories, etc. The
referral centre may even bring out such documents. So, in simple referral centre provide
switching mechanism among different types of information institutions. The referral service may
be one of the activities of a documentation centre and it is difficult to find units performing this
function exclusively. To achieve its objectives a referral centre has to perform certain basic
operations. These includes
i) A referral centre possesses an inventory of all significant information resources in different
disciplines.
ii) It compiles and publishes directories of scientific and technical information resources.
iii) It analyzes the operating relationships that exist in the scientific information.
The function of referral centres includes
i) Collect information about information sources within the range of scope of either the subject
or activity of the referral centre.
ii) Prepares comprehensive inventory of types of information services available from these
sources with a detailed subject index to facilitate access.
iii) Functions as an intermediary between inquirers and the organization or individuals who
possess specialized information of the subject of enquiry;
iv) Guides users to appropriate sources where from the required information may be obtaining.
The Examples of referral center includes
a) British Library Lending Division (BLLD), UK.
b) National Referral Centre, Library of Congress.
8. Clearing Houses: A clearing house is a central agency for collection, classification and
distribution of information. It may include specialized information centres as well as
conventional libraries. It represents a depository for document with the additional objectives of
servicing as a central agency engaged in the distribution of information. It also includes such
functions as collecting and maintaining records of research and development.
Clearing houses provide a single point of access to documents originating from a number
of sources from different places, in different languages. The producers of the documents inform
the clearing house about the bibliographical details of the document and usually send them a
copy. The clearing houses circulate the description of the documents to the organization that are
interested in the field and to the participating organizations. They may provide a copy of these
documents as well on request if available. These units are organized either on a cooperative basis
or by an international or national agency.
Most of the clearing houses have specialized as well as they developed collections. They
have information gathering network to acquire documents in their subject areas. They also
provide specialized information services in some selected areas. They answer specific and
general type of questions and may act as central searching places for enquiry especially for
research and development areas.
The difference between a documentation center and a clearing house is that the
documentation centre deals with conventional documents, whereas the clearing house deals with
the non-conventional documents like conference proceedings, scientific reports, document of
limited circulation, etc.
9. Translation Centres: In modern times in any discipline literature are published in many
languages as a result, scientist in need of particular information find it difficult to be able to
understand the contents of the documents. To solve the problem, some national and international
level organization comes forward to help the scientist in this regard. They translate the content of
the documents from one language to another to meet the needs of the user. In the field of science
and technology following centre provides translation services.
a) National Translation Centre, Chicago, America
b) International Translation Centre, Delft, Netherlands
c) British Library Lending Division, Boston
10. Data Consolidation and Evaluation Centre: It is an advance form of information units
which check systematically all available data and organize them into a number of categories for
the purpose of showing the current state of knowledge together with comments on the precision
or reliability of the data in regard to the various aspects of a product or phenomenon.
11. Let Us Sum Up: In practical life each of the information unit performs more or less the same
function, at least to a certain extent making it difficult to make a distinction between different
components of information system. So it will not be correct to go by the name of the information
unit. However Claire Guinchat and Michel Menou say that the most important criterion for
distinguishing the information unit is the kind of information activity (or the primary function)
they perform.
Communication
Communication: The term “communication” comes from Latin word “communis” meaning
common. When we communicate with someone we try to establish a certain degree of
commonness with the communicate. Eg. By sharing some information, an idea or an attitude.
Communication therefore refers to transmission or exchange of information, message, etc.
Communication takes place when people send or receive message of various kind. So
information and communication are two interlinked term in the sense that without information
communication is not possible.
The Oxford English Dictionary defines communication as “the imparting, conveying or
exchange of ideas and knowledge whether by speech, writing or signs”.
The Columbia Encyclopaedia of Communication defines it as “the transfer of thought and
message as contrasted with transportation of goods and person”.
In ordinary usage the verb “to communicate” means
i) To exchange thoughts, feelings, information;
ii) To make known;
iii) To make common;
iv) To have a sympathetic relationship.
In the noun form “communication” refers to
i) The exchange of symbols, common message, information;
ii) The process of exchange between individual through a common system of symbols;
iii) The art of expressing ideas and
iv) The science of transmitting information.
In the popularly understood sense of the term communication refers to anything from a
face to face conversion between two persons, conversion over the telephone, and correspondence
between friends. The transmission of programmes on live television are broadcast via
communication satellite i.e received by millions of people.
1. Elements of Communication: The communication process requires at least three elements.
a) Source: The source is a point at which message originates. It can be an individual or an
organization, a human being or a machine.
b) Channel: The message may be in audible, visual, or tactile form as any signal capable of
meaningful interpretation.
c) Destination: The destination or recipient, which again can be a person or a group of person, is
in the final link of the communication chain. Destination is the interceded target of the message.
2. Media and Forms of Communication of Information: There is a distinct difference between
communication of information and communication of commodities, energy, heat, etc. i.e one’s
own stock of information or knowledge is not going to diminish by communicating to others.
Thus the ownership of information may multiply but not change hands like a physical
commodity. Further one can communicate information which he does not have, eg. about one’s
own behaviour.
Quite often two or more channels may be used together for effective communication and
the channels of dissemination may form a series of alternative routes, through the total
communication system.
Communication is a process of transferring message from one point to another. The four
element of any communication process are the reader, the medium, the receiver and the
feedback. In Library and Information Science several models of communication are used in the
dissemination of information through e-mail, post, telephone line, through oral verbal
communication, videoconferencing etc.
Components of a Computer
Components of a Computer: The computer unit is frequently called as the computer system
because of its numerous parts, machinery units and complicated sequential operation. A
computer system has three main parts i.e Hardware, Software and Humanware. A general
purpose computer has two main parts Hardware and Software.
1. Hardware: The physical or mechanical parts of the computer system that can be seen and
touched are known as hardware. It consists of a combination and collection of electro-
mechanical and electronic components and devices, electronic circuits and microelectronic
equipment assembled in metal boxes in the form of modules and cabinet. All these equipment
and elements are interconnected by wiring and switching communication components like
transistors, capacitors, resistors, diodes, printed circuits, integrated circuits, main and auxiliary
storage systems, various types of magnetic media, communication media for carrying and
transformation of data, coded instruction, etc. The different hardware parts are interconnected by
busses, often made of groups of wires.
Any computer system has three important hardware parts. They are input device, central
processing unit and the output device. The central processing unit itself has three parts, namely
memory unit, control unit and arithmetic and logic unit. These three units along with the input
and output devices form the five important components of any computer system. In addition to
the above five parts mentioned, computers also have secondary storage devices, which are used
for storing data or instruction on a long term basis.
A) Input Unit: The input devices are used to transfer the information into the memory unit of a
computer. In simplest term, they bring information into the computer from the user’s hand, i.e.
input unit feeds data into the computer. It is thus a communication medium between the user and
the machine. The input devices are of the following types.
i) Keyboard: Keyboards are the most commonly used input devices usually having 83-84 keys
and enhanced with 101 keys or even more. The enhanced keyboards are more popular.
ii) Mouse: It is a hand-held pointing device that allows controlling the computer without having
to type the instruction through keyboard. The Scrolling mouse is a small unit with a round ball at
the bottom and with two depression switches at the upper top portion having again a scroll
button. Nowadays cord less as well as without scroll ball-type of mouse is also used.
iii) Scanners: Scanners are used to store or feed an entire image / data or page of other
information into the computer system. Image scanner is a general-purpose device which digitizes
a two-dimensional image.
iv) Track Ball: A trackball is just like a mouse lying on its back. It is stationary and does not
need to move on any surface. To move the pointer only the ball should be rotated with the thumb
/ finger or with the palm. The buttons next to the ball are used just like mouse button.
v) Joystick: A joystick is an input device consisting of a stick that pivots on a base and reports
its angle or direction to the device it is controlling. Joysticks are often used to control video
games and they usually have one or more push-buttons whose state can also be read by the
computer.
Fig. 2: Elements of a joystick Fig. 3: A 6×8 Wacom Intuos3 Fig. 4: Front and back of a
elements: 1. Stick 2. Base 3. graphics tablet with DuoSwitch Canon PowerShot A95.
trigger 4. Extra buttons 5. erasing Grip Pen stylus and 5-
Autofire switch 6. Throttle 7. button scrollwheel puck.
Hat Switch (POV Hat) 8.
Suction Cup
vi) Digitizing Tablet: A graphics tablet (or digitizing tablet, graphics pad, drawing tablet, pen
pad or digitizer) is a computer input device that allows one to hand-draw images and graphics,
similar to the way one draws images with a pencil and paper. These tablets may also be used to
capture data or handwritten signatures.
vii) Digital Camera: A digital camera (or digicam) is a camera that takes video or still
photographs, or both, digitally by recording images via an electronic image sensor.
viii) Magnetic Ink Character Recognition (MICR): It allows the computer to recognize
character printed using magnetic ink. MICR is widely used in banks to read the cheque number
written on the bottom of the cheque. It is also used in the back of credit cards and bank debit
cards and ID cards.
ix) Optical Character Recognition (OCR): An optical character reader is used to read character
of special type fonts printed on conventional paper with conventional ink i.e. it involves reading
text from paper, book or from a magazine articles but they still have difficulty with handwritten
text.
x) Bar Code Reader: Bar code readers are photoelectric scanner that reads the bar codes or
vertical zebra striped marks printed on the product container and the computer automatically tells
the prices of the product at the terminals.
xi) Speech Recognition and Voice Response Devices: In this type of device the user speaks into
a microphone which is attached to a digitizer. The dizitizer converts the analog sounds waves to
“0” and “1”s which can be easily understood by the computer. Speech recognition devices are
necessary because spoken commands are much quicker than typing. It helps to give command to
a remote computer over telephone. It helps the computer usable to the blind people. In computer
assisted learning environment it helps in the interaction between the man and machine.
xii) Touchscreen: A touchscreen is a display that can detect the presence and location of a touch
within the display area. The touchscreen has two main attributes. Firstly, it enables one to
interact with what is displayed directly on the screen, where it is displayed, rather than indirectly
with a mouse or touchpad. Secondly, it lets one do so without requiring any intermediate device
such as a stylus that needs to be held in the hand. Such displays can be attached to computers or,
as terminals, to networks.
xiii) Touchpad: A touchpad (also trackpad) is a pointing device consisting of specialized surface
that can translate the motion and position of a user's fingers to a relative position on screen. They
are a common feature of laptop computers and are also used as a substitute for a computer mouse
where desk space is scarce.
xiv) 14 Light Pen: A light pen is similar to a mouse except that with a light pen one can move
the pointer and select objects on the display screen by directly pointing to the object with the
help of the pen.
xv) Optical Mark Recognition (OMR): Optical Mark Recognition (OMR) is also called mark
sensing. It is a technology where an OMR device senses the presence or absence of a mark such
as pencil mark. OMR is used in test such as aptitude test.
B) Central Processing Unit (CPU): The CPU is the brain of any computer system; all major
calculations and comparisons are made inside the CPU and it is also responsible for activating
and controlling the operations of other units of a computer system. It guides, directs and controls
a computer performance. It also executes the instruction given to it. The CPU consists of the
ALU, control unit, registers, and basic I/O (and often other hardware closely linked with these).
Early CPUs were composed of many separate components but since the mid-1970s CPUs have
typically been constructed on a single integrated circuit called a microprocessor.
a) Arithematic and Logic Unit (ALU): The input devices are used to transfer the information
into the memory unit of a computer. Information from the memory can be transferred to the ALU
where comparison and calculation are done and the results are sent back to the memory unit. The
set of arithmetic operations that a particular ALU supports may be limited to adding and
subtracting or might include multiplying or dividing, trigonometry functions (sine, cosine, etc)
and square roots. Some can only operate on whole numbers (integers) whilst others use floating
point to represent real numbers with limited precision. An ALU may also compare numbers and
return boolean truth values (true or false) depending on whether one is equal to, greater than or
less than the other. Logic operations involve Boolean logic: AND, OR, and NOT. These can be
useful both for creating complicated conditional statements and processing Boolean logic.
b) Control Unit: It acts as a manager which controls all activities being carried out within the
computer. The control unit strictly obeys the instruction given by us, follows the instruction in
the same sequence and executes them one after another until the entire set of instruction is
exhausted. CU brings one instruction at a time from the memory, interprets it and obeys it by
coordinating the working of all other units. The CU tells the input unit what is to be read and
addresses the memory as to where it is to be stored. The CU ensures that according to the stored
instruction the right operation is done on the right data at the right time. It manages and
coordinates the entire computer system. The simplified descriptions of the steps that are
performed by the Control unit are given below. Some of these steps may be performed
concurrently or in a different order depending on the type of CPU
* Read the code for the next instruction from the cell indicated by the program counter (program
counter is conceptually just another set of memory cells, it can be changed by calculations done
in the ALU);
* Decode the numerical code for the instruction into a set of commands or signals for each of the
other systems;
* Increment the program counter so it points to the next instruction;
* Read whatever data the instruction requires from cells in memory (or perhaps from an input
device). The location of this required data is typically stored within the instruction code;
* Provide the necessary data to an ALU or register;
* If the instruction requires an ALU or specialized hardware to complete, instruct the hardware to
perform the requested operation;
* Write the result from the ALU back to a memory location or to a register or perhaps an output
device
* Jump back to step one.
c) Memory Unit: It is the workspace area within the computer where the data and instructions
are stored. It holds all data, instruction and results temporarily. It stores the data to be processed,
the intermediate results and the final results until they are displayed. It contains the programs that
are currently being run and the data the programs are operating on. In modern computers, the
main memory is the electronic solid-state Random Access Memory (RAM). It is directly
connected to the CPU via a "memory bus" and a "data bus". The arithmetic and logic unit can
very quickly transfer information between a processor register and locations in main storage, also
known as a "memory addresses". The memory bus is also called an address bus or front side bus
and both buses are high-speed digital "superhighways". Access methods and speed are two of the
fundamental technical differences between memory and mass storage devices. Main memories
are of the following types
i) Random Access Memory (RAM): It is the key working area of the memory. It is possible to
select randomly and use any location of this memory. It is also called the read/write memory
because information can be read from RAM chip and can also be written into it. It is a volatile
storage medium i.e. the contents of the memory are lost when power is switched off/cut, as it
requires a steady flow of electricity to maintain its content. RAM is also quite expensive. RAM
may be of VRAM, WRAM, NVRAM.
ii) Read Only Memory (ROM): It holds permanent data or instruction that can only be read. That
information is permanently recorded and cannot be changed by the programmer. It is non volatile
in nature i.e. the contents of ROM are not lost when the computer is switched off. It contains
instruction to get the computer started when the switch is on, holds instruction and data that
control the various peripheral units of the computer such as graphic display, disk drives, etc.
Most personal computers contain a small amount of ROM that stores critical programmes, as it is
expensive to produce. Typically, ROM must also be completely erased before it can be rewritten,
making large scale use impractical, if not impossible. ROM may be of the following types-
* Programmable Read Only Memory (PROM): A PROM is a memory chip on which set of
instructions or information can be stored, but it cannot be modified or wiped out later on. Like
ROM its memory is also non volatile. To write data on a PROM one will need a special device
called a PROM programmer or PROM burner. The difference between a PROM and ROM is that
PROM is manufactured as blank memory where ROM is programmed during the manufacturing
process.
* Erasable Programmable Read Only Memory (EPROM): EPROM is used widely in personal
computers to enable the manufacturer to change the contents of PROM before the computer is
actually skipped so that the bugs can be removed and new versions can be installed shortly
before delivery. The EPROM is of two types - Electrically Erasable PROM (EEPROM), where
high voltage electric pulses are used to erase the previous data or instruction and after that the
disk can be reused and Ultra Violet Erasable PROM (UVEPROM), which retains its data or
instruction until it is exposed to Ultra Violet light. The UV light clears its contents making it
possible to reprogramme the memory. The difference between an EPROM and PROM is that
while in PROM the data or instruction can be written only once and cannot be erased, in EPROM
the content can be erased and reprogramming can be done.
iii) Flash Memory: Many modern PCs have their Basic Input Output System (BIOS) stored on
flash memory chip so that it can easily be updated if necessary. Such type of BIOS is sometimes
called flash BIOS. Flash memory is also important for modem as it enables the modem
manufacturer to support new protocols as they become standardized. EEPROM is similar to flash
memory (sometimes called flash EEPROM). The principal difference between the two is that
EEPROM requires data to be written or erased in byte at a time whereas flash memory allows
data to be written or erased in blocks. This makes flash memory faster.
iv) Cache Memory: It is a special type of internal memory used by many central processing units
to increase their performance or "throughput". Some of the information in the main memory is
duplicated in the cache memory, which is slightly slower but of much greater capacity than the
processor registers, and faster but much smaller than main memory. Multi-level cache memory is
also commonly used—"primary cache" being smallest, fastest and closest to the processing
device; "secondary cache" being larger and slower, but still faster and much smaller than main
memory.
C) Output Unit: An output device is any product or machine that is capable of bringing
information for user view. It presents the processed data or information to the user. It can be a
printed page, a picture in monitor, and so on. Anything which comes out of a computer system is
the output of it. The common output devices are-
a) Monitor [Video Display Unit (VDU) / Cathode Ray Tube (CRT)]: It looks like a television.
The advantage of having a video display unit is that as we write we can see what is being fed into
the computer and by this way we can spot the mistakes and make the necessary correction. It also
helps to display the stored information inside the computer system.
b) Liquid Crystal Display (LCD): CRT screens are relatively heavy and bulky, therefore
unsuitable for small portable computer like note book. Considering this the screen of a portable
computer is effectively replaced by a flat panel LCD screen which is smaller in size and lighter
in weight.
c) Printer: A computer printer, or more commonly called the printer, is a device that produces a
hard copy (permanent human-readable text and/or graphics) of documents stored in electronic
form, usually on physical print media such as paper or transparencies. Many printers are
primarily used as computer peripherals, and are permanently attached by a printer cable to a
computer which serves as a document source. The latest technology is combining printers with a
scanner and/or fax machine in a single unit. The world's first computer printer was a 19th-
century mechanically driven apparatus invented by Charles Babbage for his Difference Engine.
d) Plotter: A plotter is a vector graphics printing device which operates by moving a pen over
the surface of paper. Plotters are used in applications such as computer-aided design, though they
are being replaced with wide-format conventional printers.
e) Speaker: Speaker output the music or speech from the programme. A speaker or loudspeaker
converts an electrical signal to sound. The speaker pushes a medium in accord with the
pulsations of an electrical signal, thus causing sound waves to propagate to where they can then
be received by the ear.
f) Computer Output on Microfilm and Microfiche (COM): The output from the computer,
instead of being printed is displayed on a high resolution cathode ray tube, and the output is
obtained in microfilm or microfiche from which it is often used to store massive data in compact
form. Then, when needed, with the help of a special microfilm reader it is used to read the
output.
g) Speech Output Unit: A speech output unit is one which reads string of character stored in a
computer memory and converts it into spoken sentence. This type of speech output is very useful
in many areas.
Examples: A telephone where a message is given to the caller when the number dialed does not
exist, railway and airlines enquires.
D) Auxiliary Storage Devices: Auxiliary memory / storage devices or secondary storage
supplements the main memory and it requires the computer to use its input/output channels to
access the information. Secondary storage is also known as “mass storage devices”. It functions
as back up device even if by some accident the computer is crashed and the data in it is
unrecoverable. One can restore it from the backups. It acts both as input and output devices. The
secondary storage devices are also used as a transport medium to transfer data or information
from one computer system to another computer system. If we use keyboard as an input device
we will waste a lot of valuable computer times because manual input is always slow. Secondary
storage is also used for long-term storage of persistent information. Secondary storage device
includes Magnetic tapes, Floppy disc, CD / DVD, Pen drive, External Hard Disc etc. The Floppy
and Magnetic Tapes are now obsolete as secondary storage devices.
i) CD-ROM: CD-ROM is an abbreviation for Compact Disc Read-only memory. The standard
CD-ROM holds 650 or 700 MiB of data. A "700 MB" CD has a nominal capacity of about 700
MiB. The CD-ROM is popular for distribution of software, especially multimedia applications,
and large databases.
ii) DVD: It typically may contain at least 4.4 GiB of data, nearly 7 times the amount of a CD-
ROM. DVD capacities are given in decimal units: A "4.7 GB" DVD has a nominal capacity of
about 4.38 GiB.
iii) Pen Drive: A USB flash drive consists of a NAND-type flash memory data storage device
integrated with a USB (Universal Serial Bus) interface. USB flash drives are typically removable
and rewritable, much smaller than a floppy disk, and most weigh less than an ounce (30 g).
Storage capacities can range from 64 MB to 256 GB with steady improvements in size and price
per capacity. Some allow 1 million write or erase cycles and have 10-year data retention,
connected by USB 1.1 or USB 2.0.
Initial Recurring
Let Us Sum Up: Budget statement or record is a definite financial record which speaks of the
back history, present position and future development of the library. It is also a statement for
comparing the position and the trend of development between the past, present and future.
Budgetary statement generally depends on the sources of income and expenditure of the library.
Library budget may be divided into two parts- Income and expenditure.
British Library’s Automated Information SErvice (BLAISE)
British Library’s Automated Information SErvice (BLAISE): Blaise is an online information
retrieval service that includes access via a new graphical interface on the World Wide Web. It is a
library network which was introduced in April 1977 and now it is the world largest commercial
service. It is an online interactive computerized information retrieval and cataloguing system and
the individual databases are stored on an IBM-370 computer located at Harlow. Teletype
compatible terminals are used together with the ordinary public telecommunication system to
access BLAISE. Thus BLAISE can be called up from anywhere in the UK and Europe. The
system is available from 9-5 on Monday to Thursday and 9-4.30 on Friday. To access BLAISE,
subscribers are given individual identity numbers and passwords.
The following services are available through BLAISE-
a) BLAISE Line: It is operated from the existing computer installation at Harlow, Essex. It host
British library bibliographic database. Telnet access is also available. The Web version of
BLAISE-LINE is called BLAISE Web.
b) BLAISE Link: It is the official host providing full access to all US National Library of
Medicine MEDLARS databases, in the UK and Ireland, via the British Library. It is also
involved in processing UK / Irish contributions to the MEDLINE database. The BALISE Link
provide access to the following
i) MEDLINE: The MEDLARs databases are available through online in the form of Medline.
ii) SDI-Line: It contains the latest month’s reference to be used primarily for current awareness.
iii) Chem-Line: It is an online dictionary files which enables the user of Toxline to describe
chemical substances before beginning the search.
iv) Mesh: It is a controlled indexing structure of MEDical Subject Heading.
c) Catalogue: The catalogue production is made through Local Catalogue Service (LOCAS)
which is an integral part of BLAISE.
d) Database: BLAISE provide access to 21 databases containing 18.5 million bibliographic
records.
e) Editors Software: It was developed by British Library. The editor system of BLAISE allows
records to be transferred from MARC files and edited. The new records can also be created and
added to the main database.
Blaise gives access to a wide range of bibliographic information that includes not only British
Library catalogues but also complementary bibliographic databases, some of which are produced
outside the British Library. Blaise has other value-added features, such as its link to the British
Library Document Supply Centre for ordering loans and photocopies and its ability to supply
fully formatted catalogue records for use in local automated catalogues. Blaise has traditionally
been used by trained librarians in other libraries. Recently, Blaise has added a World Wide Web
option that makes it much easier to use by untrained and inexperienced searchers.
According to Allen Kent "the success and survival of libraries will much depend on how much
and to what extent the libraries cooperate with each other in future". Further, tremendous
explosion of information, financial constraints, information in different forms, etc., compelling
the libraries to form network and consortia is an essential facet of modern library practices.
In library network the particular focus is forming online networks by using computers
and linking members to the computer resources by means of telecommunication connections.
When a group of libraries using computers decide to exchange information, a network is
developed.
The library network deals with the development of software for library automation,
automation of the member libraries, retro-conversion of records, cooperative acquisition,
creating union catalogue, development of database of the holdings in member libraries,
conducting training, workshops and seminar, providing DDS, Email, CD-ROM, internet access
facilities. It also provides reference service, referral service, and provides technical support to
member institutions in the selection of hardware, software, and technical problem faced by the
member libraries. But till now except DELNET and INFLIBNET, most of the other library
networks have yet to develop databases of library holdings in a significant way. Even these two
networks have to go a long way to cover in their databases the entire holdings of all the
participating libraries. Unless this is achieved, the networks would not be able to achieve
significant resource sharing as well as rationalization in library acquisitions.
Book Selection Theories
Book Selection Theories: There are some principles of selection of documents which guide the
librarian in making a judicious choice of a document and thus help to develop a meaningful
collection of documents in the libraries.
f) Transmitting Books: Then the books are sent to the technical department for classification
and cataloguing (processing). At this step each book should also be provided with a process slip
(7.5 cm X 12.5 cm) as well as earlier order slip.
g) Transmitting Bills: Then bills are passed for payment.
h) Books – In-Process: The cards belonging to them, after noting the date of accessioning and
the accession numbers, are filed in a tray labelled as “Books – In-Process”.
Terms
In India, in Karnataka, the Karnataka Government passed a resolution for the librarian to be
treated on par with a teacher on 21st July 2006. Of course this is due to the efforts of the
Karnataka State College Librarians’ Association and fde credit goes to the Minister for Primary
and Secondary Education Shri. Basavaraj Horatti and Shri D H. Shankarmurthy respectively.
Further, each individual working in an organization wants a feeling of group
belongingness, as the public librarian are group among government officer, the librarian in
research laboratories are group among scientist so the academic librarian wants to grouped alone
with the faculty member of the institution.
So in conclusion if we count the academic and professional qualifications of librarian,
they are same as that of teaching staff, so the status should also be the same.
Academic Library
Academic Library: Libraries in the educational institutions are concerned with the teaching and
learning process experienced by specific communities.
a) Definition: A library which is an integral part of a college, university, or other post-secondary
educational institution (higher education), administered to meet the needs of its students, faculty,
and staff for scholarly information and research services is the academic library. Large college or
university libraries often have separate libraries within individual academic departments or
schools which have a collection devoted to their subject or discipline such as chemistry,
mathematics etc.
i) College Library: The college library meets the legitimate needs and demand of all their users
from senior teachers engaged in research to fresh students just entering. The library serves the
reading, reference and research needs of the members of the college community.
ii) University Library: According to Donald Davinson library is the “soul” of a university, the
sun around which all teaching revolves. The Radhakrishnan Commission in its report hailed the
library as the very “heart of a university”, the “workshop of the scholar” and “the laboratory of
the learned”.
b) Objectives: The general objectives of the academic libraries are:-
i) To serve the curricular, cultural and general education requirement of the academic
community;
ii) To provide reference material at appropriate levels;
iii) To provide study areas of users;
iv) To provide a lending service appropriate to different types of users;
v) To provide an active information service.
These libraries are located on the campuses of colleges and universities and serve
primarily the students and faculty of that institution and other academic institutions. Some
academic libraries are also accessible to the general public in whole or in part, although
borrowing privileges are often limited for users affiliated with the college or university only.
i) College Library: The college library aims to help young students in proper understanding of
various disciplines, in preparing them for advanced studies, and for shouldering the higher
responsibilities in future life. It also helps the students in getting acquainted with the library
practices such as consulting catalogues, bibliographies, indexes, locating books, and other
materials, etc.
ii) University Library: Its primary aim is to support the instructional and research programmes
of the university and conservation of knowledge and ideas, teaching, research, publication,
extension service and interpretation. The objective is to ultimately help produce leaders in the
community in different fields of human activity- the inventors, discoverers and pioneers.
c) Collections: The collections of academic libraries reflect the courses offered and research
undertaken within the institution. In recent times most of the academic libraries tend to use new
computers, telecommunications equipment for access to the Internet, and online databases, E-
Journal etc. Also as in the age of information explosion no college or university library can
procure all published documents therefore the academic libraries can form a network on
cooperative basis that would enable them to share the scarce and little-used materials required for
advanced research.
i) College Library: The college libraries build up a balanced collection consisting of a wide
variety of learning and teaching materials to satisfy varied curricular and extra-curricular
activities of both students and teachers. The collections are selected and developed on the basis
of educational philosophy and objectives of the institution, size and nature of the student body,
size of the faculty and their needs for research materials. The collection includes text books and
recommended books, books of advanced nature for teacher, a wide range of reference books,
travelogues, biographies, learned periodicals.
ii) University Library: The collection of the university library includes materials to meet the
needs of post-graduate students as well as resources of sufficient breadth and depth to support
serious scholarship in all areas. The collection, in fact, embraces a wide variety of subjects for
learning, teaching, research and publishing. It provides a general collection, rare materials,
newspapers and periodicals, government publications, special materials such as theses,
dissertations, archives, clipping, visual and audio-visual materials, digital objects, and so on.
d) Services: The academic library plays a central role in the academic work of students and
faculty at colleges and universities and is often considered the most important resource of the
institution of higher education. As students and faculty at colleges and universities may wish to
conduct research within any conceivable academic discipline, the collections of academic
libraries usually reflect a vast range of interests and formats. It has both a comprehensive
collection to support formal or class room teaching as well as bears a representative collection of
different research activities. Some of the universities maintain the largest libraries in the world.
Because of the complexity, range, and diversity of formats and information in academic
libraries, they frequently offer orientation, library tour programs to introduce incoming students
and faculty to the institution’s library services. These programs are designed to teach new users
the effective ways to make use of a variety of reference tools and library search mechanisms.
Even in some parts of the United States, college accreditation agencies require institutions to
offer library-sponsored courses on information retrieval and evaluation.
i) College Library: The basic function of the college library is to assist its parent institution to
carry out its programmes. It must serve the needs and requirements of teachers and students
towards reading, study and research. Its educative function includes- providing materials to the
college community, making materials easily accessible, arranging orientation programmes in the
use of the library, providing bibliographical information to the faculty, arranging inter-library
loan, and similar others.
ii) University Library: The university libraries provide ready access to materials and facilities
such as translation, typing, photocopying. In an effort to provide more efficient service the
university library often participates in co-operative undertaking in networking, consortia,
interlibrary lending, co-operative and centralized cataloguing and compilation of bibliographies.
By accumulating and organizing materials, the library serves as an invaluable aid in the
conservation of knowledge and as an active force in teaching, research and extension programme
of the university. It also provides a variety of library documentation and information services
necessary for the success of the formal programmes of instruction. It also participates in the
interpretative function of the university through assistance to the faculty and research staff.
Abstracting Periodicals
1. Abstracting Periodicals: According to Allent Kent “an abstract is a summary of a publication
or articles accompanied by an adequate bibliographical description to enable the publication or
article to be traced.
H. M. Weisman defines “the abstract is an announcement medium whose objectives is to
provide knowledge of and an ordered and logical access to new primary literature”.
Thus an abstract can be defined as an abbreviated, accurate representation of the
significant content of a document consisting scope, purpose, method used, kinds of treatment
results and findings, interpretation of the result by the author, argument, etc which is usually
accompanied by an adequate bibliographical description to enable to trace the original document.
An abstracting periodical is “a regularly issued compilation of concise summaries of
i) Significant articles (often in a very limited subject field) that appear in current primary source
journal and
ii) of important new research monographs, reports, patent and other primary source publication
in that field”.
Example: Library and Information Science Abstract, London, Library Association, 1950-,
Bimonthly. Indian Science Abstract, Delhi, Insdoc, Vol. 1-, 1965-.
Besides the above sources, list of periodicals, list of theses, dissertations, location and
finding list etc also serves as bibliographical sources.
Development in Libraries (United Kingdom)
1st Library act ant National Level in the world- 14 August 1850
Public Library and Museum Act-1964
UGC-UK (Parry Committee Report)-1964
Various Reports
1) Adams Report-1915
2) Mitchell & Kenyon Report-1924
3) McColvin Report-1942
4) Robert Report-1959
Theory Z Ouchi
E. CATALOGUING SCHEMES
Indexing
Pre-Coordinate Indexing
1 Kaisers systematic Indexing 1911
2 Chain Indexing
3 Relational Indexing- J.E.L.Farradane 1950
4 Coats Subject Indexing- E.J. Coats 1963
5 PRECIS-Derek Austin 1974
6 POPSI- G. Bhattacharya 1964
Post-Coordinate Indexing
1 UNITERM- Martimer Taube 1953
Year of Pub.
Science Citation Index 1974
Social Science Citation Index 1973
Arts & Humanities Citation Index 1978
Thesaurus
1 Roget’s Thesaurus 1852
G.NATIONAL/INTERNATIONAL
H.LIBRARIES SOFTWARE
Operating Systems
UNIX 1969
LINUX 1991
MS-DOS 1982
WINDOWS 1985
Programming Languages
FORTRAN 1957
PASCAL
COBOL
JAVA 1994
VB 1991
C 1972
C++ 1983
VB .NET
JAVA SCRIPT 1995
AJAX
PHP 1995
HTML
XML
MS-SQL
MySQL
PostGreSQL
The UNIVAC and ENIAC (Electronic Numerical Integrator And Computer) computers are
examples of first-generation computing devices. The UNIVAC was the first commercial computer
delivered to a business client, the U.S. Census Bureau in 1951.
History: Work on a layered model of network architecture was started and the International
Organization for Standardization (ISO) began to develop its OSI framework architecture. OSI had two
major components: an abstract model of networking, called the Basic Reference Model or seven-layer
model, and a set of specific protocols.
The concept of a seven-layer model was provided by the work of Charles Bachman, Honeywell
Information Services. The new design was documented in ISO 7498 and its various addenda.
HOST LAYERS:
Segments
MEDIA LAYERS
Packet/Datagram
Frame
Bit
COMMUNICATION MODELS:
Non-linear Models
Multidimensional Models
Notable work(s
Colon Classification1933
Classified Catalogue Code: With Additional Rules for Dictionary Catalogue Code1934
Library Administration
Headi gs a d Ca o s 9 .•
Besides Colon Classification and the Five Laws of Library Science, other important works written by him,
include Classified Catalogue Code (1934), Prolegomena to Library Classification (1937), Theory of the
Library Catalogue (1938), Elements of Library Classification (1945), Classification and International
Documentation (1948), Classification and Communication (1951) and Headings and Canons (1955),
Development in Libraries (United Kingdom)
Parish libraries was Dr. Thomas Bray (1656-1730).
1st Library act ant National Level in the world- 14 August 1850(red letter day)
Public Library and Museum Act-1964
Various Reports
1) Adams Report-1915
2) Mitchell:1924 & Kenyon Report-1924
3)Kenyon report 1927-Public libraries
4) McColvin Report-1942- Public libraries.
5) Robert Report-1959
7) University Grants Committee on Libraries (the Parry (1904-1985) Report) published in 1967
National Libraries Committee under the Chairmanship of the late Lord Dainton issued in 1969.
1972 The British Library Act was passed by Parliament, bringing the Library into operation with effect from 1 July
1973.
COPYRIGHT ACTS
Association of Special Libraries and Information Beureaux –ASLIB 1924 (The Association for Information
Management)
India Library Association 1933
IFLA-1929
UBC-1974, UAP-1976
IFLA Universal Bibliographic Control and International MARC Core Activity (UBCIM) which has been hosted by Die
st
Deutsche Bibliothek since 1990, is closed as per 1 March 2003.
UNESCO 1945
IASLIC 1955
RRRLF 1972
INIS:IAEA: 1970
APINESS:1986
INSPEC: IEE:1967
ENVIS in 1982
INFMN SYSTEMS IN SS
ICSSR:MHRD:1969
NASSDOC:1969
Indira Ganthi National Centre for Arts (IGNCA):1985(The Centre comprises five divisions viz. i) Kala
Nidhi, ii) Kala Kosa, iii) Janpada Sampada, iv) Kala Darsana, and v) Sutra Dhara.)
National Mission for Manuscripts (NMM): Feb. 2003
Indian Council for Cultural Relations (ICCR):1950
Indian Council of Historical Research (ICHR):1972
Indian Council of Philosophical Research (ICPR): March 1977
National Archives of India (NAI): March 1891 in Calcutta.
Conf/seminars on Cataloguing
4. International Conference on the Principles and Future Development of AACR, 1997 Toronto
SubjectHeadings
Library of Congress Subject Headings 1898
Sears List of Subject Headings (SLSH) 1923/ M. Sears
"Z39.50" refers to the International Standard, ISO 23950: "Information Retrieval (Z39.50):
Application Service Definition and Protocol Specification", and to ANSI/NISO Z39.50.
GREENSTONE 1997
EPRINTS 2000
DSPACE 2002
Operating Systems
UNIX 1969
MS-DOS 1982
WINDOWS 1985
LINUX 1991
LIBRARY LOCATION
Asiatic Society Library Bombay
British Museum UK
Conamora Public Library Chennai
Khudabaksha Oriental Library PATNA
Library of Congress USA
National Science Library Delhi
National Library Calcutta
National Manuscripts Library Tanjore
National Library for Blinds Dehradun
and Handicaps
National Library of Oriental Patna
Literature and Culture
National Diet Library Japan
Raja Rammoha Roay Library Calcutta
Sarswati Mahal Library Tanjore
State Lenin Library Russia
Committee Year
Hunter commission 1882
Indian uty cmmisn (Lord Curzn) 1902 Title Author
Sadller cmn 1917 Elements of Library Classification S.R. Ranganathan
Radakrishnan cmn 1948 Library Administration Theory And R.L. Mithal
UGC 1953 Practice
Ranganathan Committee on University 1957 Cataloguing Theory and Practice C.G. Viswanathan
and College Libraries Rules for Dictionary Catalogue C.A. Cutter
Advisory committee/ sinha kp 1958 Little Science Big Science D.J. Desolla Price
Ranganathan Committee on LIS 1961 Documentation S.C.Bradford
Education
Subject Approach to Information D.J. Fosket
Kothari cmn 1964 Manual of Library Economy N.R. Look
Kaula Committee on Curriculum 1990 Documentation and its facets S.R. Ranganathan
Development in LIS Education
Manual of Cataloguing Practice C.G. Viswanatham
Subject Panel on Lib. &Inf. Sc. 1997
Karisiddappa Committee on Curriculum 1997
Development in LIS
Legislation YEAR
TN 1948
Theories Expounders AP 1960
Principles of Scientific F.W. Taylor KK 1965
Management / Father of 1856-1915
Scientific Management MH 1967
WB 1979
Functional Management Henri Fayol MPR 1988
(Command and control)/ 1841–1925
Classical Theory, Father of Haryana 1989
Administration Kerala 1989
Goa 1993
Sociological Perspective / Elton Mayo
Father of Human Relation
Mizorum 1993
School Gujrat 2000
Orrissa 2002
Theory X and Theory Y D.M. Mc Gregor Uttrakhand Public 2005
Motivation –Hygiene f.Herzberg
Approach / Father of Uttar Pradesh 2005
Corporate Strategy Rajasthan 2006
Chattisgarh 2007
Hierarchy of Needs Theory/ Abraham Maslow
Motivational theory
Pondichery 2007
1908–1970
Bureaucratic organization Max Weber- Bihar 2008
1864-1920 Arunchal Pradesh 2009
Management as a discipline Peter Drucker
A. 1928
Theory Z Ouchi
The UNIVAC and ENIAC (Electronic Numerical Integrator And Computer) computers are
examples of first-generation computing devices. The UNIVAC was the first commercial computer
delivered to a business client, the U.S. Census Bureau in 1951.
Scopus
J-Store (1995)
Emeralds
Science Direct
ERIC
J-Gate (2001)
Project MUSE (1993)
EBSCO
Pubmed
IndMed
INIS
LISA
Genamics JournalSeek
Econlit
REPEC
JAVA; 1995
Programming Language
Timeline Visual Basic: 1998
COBOL: 1959
BASIC: 1964
PASCAL; 1970
1945: Vannevar Bush's article "As We May Think" predicts the evolution of hypertext.
1952: Grace Hopper develops the first compiler, laying the foundations for programming languages.
1964: Beginner's All Purpose Symbolic Instruction Code (BASIC) is developed at Dartmouth College.
1975: Ohio State University introduces one of the first online catalogs.
1976: Queen Elizabeth II becomes the first world leader to send an e-mail.
Bill Gates drops out of Harvard to devote his full attention to Microsoft.
1978: Dallas Public Library introduces one of the first online public catalogs (OPACs).
1986: The National Center for Supercomputing Applications (NCSA) becomes the first supercomputer
center in the US.
CERN releases the World Wide Web into the public domain.
1999:Google
2006: Twitter is founded, bringing forth a new social networking tool based on brief updates, or tweets.
1968:MARC,LC
1969:GML
1971:FTP
1974:TCP
1988: Z39.50 becomes the international standard defining a protocol for computer-to-computer
information retrieval.
1990: TEI P1 "Guidelines for the Encoding and Interchange of Machine Readable Texts".
1991: Wide Area Information Server (WAIS) protocol is introduced, allowing collections of indexed
1994: World Wide Web Consortium (W3C) is established to develop common WWW protocols.
1999: Resource Description Framework (RDF) is introduced. RDF is intended to provide metadata
interoperability across different communities.
2001: METS 1.1 schema is introduced as an XML standard for encoding descriptive, administrative, and
structural metadata within a digital library.
2002:National Information Standards Organization (NISO) Technical Metadata for Digital Still Images
standards released.
2004: International Organization for Standardization publishes: ISO 15836:2003, Information and
Documentation, the Dublin Core Metadata Element Set.
2006: Australian Partnership for Sustainable Repositories develop AONS, a system which
Harvard University Library and OCLC join forces to open the GDFR, providing distributed services
2008: PREMIS Data Dictionary v.2 (PDF) is released and maintained by the Library of Congress.
2009: The UDFR, a format registry that will eventually merge PRONOM and the Global Digital Format
Registry, is announced.
5. Dr. S. R. Ranganathan was honoured with the title ___ in the year 1965. National
research professor
6. ___ brought out Dictionary catalogue in the year 1876. Charles Ammi Cutter
UGC Quiz-2
4. Dr. S. R. Ranganathan was awarded _______ in the year 1957. Padma Shri
6. Hawnt committee deals with the public library service in north Ireland
UGC Quiz - 7
Prepared by PM Raina
Answers:
1. Shodhganga
2. Session
3. Clustering
4. Kolkata
5. Index translationum
6. Bibliographic coupling
7. Archie
8. Albert Humphrey
9. World Intellectual Property Organization (WIPO)
10.Rao Sahib
1.Flow Chart used In :
a.system analysis b.Computing c.Information retrieval d.Programming
2.What is Sco-Zenix ?
a.Database b.System software c.Digital library software d.Multiuser
operating Systems
3.What is ''Lipi" ?
a.Word Processor b.Spreadsheet c.Presentation software d.Statistical
Package
8. What is NAN?
a. New area network b. Neighborhood area network c.North area
network d.None of these
9.What is IRC ?
a.Internet reconnect b.Internet refrence chart c.Internet relay chat
d.Internet rechating
10.What is ESS?
a.E-State services b.E-Serial Systema c.E-State Softawre Services
d.Electronic spread sheet.
1. Hypothesis is a :
a.Law
b.Postulate
c.Theory
d.Speculation
a.UMI
b.Silverplatter
c.Cambridge
d.NLM (USA)
a. Thesaurus construction
b. Subject heading list
c. Search formulation
d. Citation analysis
A.Op cit
b.ibid
C.Ioc cit
D.None of the above
A.Op cit
b.ibid
C.Ioc cit
D.None of the above
Codes:
10. The spiral of scientific method involves the following steps in correct
sequence:
(I) Zenith
(II) Ascendant
(III) Nadir
(IV) Descendant
Codes:
1. SQL __________________________
2.DBMS_________________________
3.Oracle is a
4.ALU is capable of
i) performing calculations
ii) monitoring system
iii) controlling operation
iv) storage of data
i) business
ii) commercial
iii) graphics
iv) research
6. Artificial intelligence is
i) Natural Brain
ii) Brain without capabilities of thinking
iii) understanding more than human brain
iv) Computer Program
7. Expert system is
i) computer program
ii) computer expert
iii)knowledge expert
iv) user interface
i) accurately
ii) inaccurately
iii)1 million decimals
iv) 2 decimals
9.DOS is a
i) program
ii) picture
iii) voice
d) none of the above
Answers
*********
*
*
*
*
*********
*
*
*
*
*********
SMART LIBRARIANS
1.Structured Query Language
2.Database management system
3.database software
4.performing calculations
5.research
6.understanding more than human brain
7.computer program
8.accurately
9.Disk Operating System
10.program
5. UGC Quiz -12
6. 1). Opaque paper is
a. Ultra-white paper
b.Ultra-white thin paper
c.Transparent paper
d.Non-Transparent paper
a. Library Quarterly
b.Program
c.Libri
d. Herald of Library Science
a. Drury
b.Urquart
c.Foskett
d.Shera
a.Indigeneous Knowledge
b.Defence Science
c.Rural Development
d. Khadi & village industries
UGC Quiz-14
a.1911
b.1886
c.1900
d.1947
a.2002
b.2005
c.2000
d.2003
a. R.D.Stuart
b. S.R.Ranganathan
c. Peter A.Pyhrr
d. C.V. Good
a.Larry Page
b.Linus Tolward
c.J. Bill Gates
d.Edgar F. Codd
UGC Quiz-15
NOTE
If you are copying or posting our posts in another website you should give
link our website.
4.Eugine Garfield was the founder of the Institute for Scientific Information
(ISI), which was located in Philadelphia, Pennsylvania
8. The ISI Web of Knowledge indexes more than 11,000 science and social
science journals.
9.The g-index is an index for quantifying scientific productivity based on
publication record
Michael Panzer, formerly Assistant Editor, has been named the 10th Editor-in-Chief of the Dewey Decimal
Classification (DDC) system.
Mr. Panzer . . . becomes the first DDC Editor-in-Chief from outside the United States.
Mr. Panzer joined OCLC in May 2007 as Global Product Manager of Taxonomy Services, and was appointed
Assistant Editor of the DDC in March 2009. From 2002 to 2005, he headed the technical team that translated Dewey
into German. He was the first member of a Dewey translation team to be appointed Assistant Editor.
“Michael Panzer is well known and widely respected in the worldwide Dewey and Semantic Web communities,”
said Jay Jordan, President and CEO, OCLC. “We look forward to his making the DDC ever more useful, to
paraphrase Melvil Dewey, in new and imaginative ways.”
Mr. Panzer served on the W3C Library Linked Data Incubator Group, and is currently a member of the W3C
Provenance Working Group.
Prior to joining OCLC, Mr. Panzer worked at Cologne University of Applied Sciences, where he was team leader of
CrissCross, a research project funded by the German Research Foundation focused on mapping SWD, DDC,
RAMEAU, and LCSH. He has an MA from Heinrich Heine University (Düsseldorf) in German Literature with a
minor in Information Science. He also attended the University of California, Davis, on a four-month research
UGC-NET Objective Question, Practice Set - F
71) Who had given the Minimal, Middling and Maximum theories of reference service?
(A) C. M. Winchell
(B) S. R. Ranganathan
(C) James I Wyer
(D) Samuel Rothstein
80) First time efforts for the development of libraries in India were made
(A) S. R. Ranganathan
(B) S. Radhakrishnan
(C) Sayaji Rao Gaekwad I
(D) Sayaji Rao Gaekwad III
82) Who propounded “Conservative, moderate and liberal theories of reference service”?
(A) William A Katz
(B) S. R. Ranganathan
(C) James I. Wyer
(D) R. Emery
85) The simple Dublin Core Metadata Element Set (DCMES) consists of
(A) 10 elements
(B) 15 elements
(C) 14 elements
(D) 18 elements
90) INSDOC has been merged with NISCOM and is now known as
(A) DELNET
(B) NISCAIR
(C) DESIDOC
(D) NASSDOC
96) Number of States in India which have enacted Public Library Legislation till date is
(A) Eighteen
(B) Fourteen
(C) Thirteen
(D) Sixteen
98) JSTOR is an online system for archiving and accessing academic journals. It is located in
(A) Germany
(B) UK
(C) USA
(D) Budapest
99) ‘Five Laws of Library Science’ was first published in
(A) 1925
(B) 1930
(C) 1931
(D) 1933
ANSWER:-
10. The title occurring in tow or more language on title page is known as- Polyglot Title
11. The name given Ranganathan for work relating to reservation of book in Issue/return section -
Bespeaking work
20. Which Source to answer the quotation "Recent articles on Ethnic Problem in SriLanka -
Sociological Abstract
21. A subject of small extension and great intention is called- Micro Subject