NIOS Class 12th Library and Information Science English Medium Solve Assignment TMA 2021

Library and Information Science (339)

Max.Marks: 20



1. Answer any one of the following questions in about 40-60 words.
(a) You have recently joined a public library. What steps would you take to promote accessibility of products/services for senior citizens?
Ans- If my library serves youth, you may find that you need to respond to a concerned adult such as a parent, guardian or board member — about resources and facilitiess in your library. This document is designed to help you explain how and why your library selects the resources it provides. It can also help you respond to questions and challenges about material that adults may consider inappropriate. Remember that it’s always best to be prepared by developing a collection management policy that includes procedures for how your library will handle requests for reconsideration of materials before such an occasion occurs. Please be sure to contact the Office for Intellectual Freedom (OIF) if you need guidance in developing your policy and procedures. And please know that if you do receive a challenge, OIF stands ready to guide you.
2. Answer any one of the following questions in about 40-60 words.
(b) How, in your opinion, are the Five Laws of Library Science applicable in modern automated libraries?
Ans- The 5 Laws of Library Science is a theory proposed by S. R. Ranganathan in 1931, detailing the principles of operating a library system. Five laws of library science are called the set of norms, percepts, and guides to good practice in librarianship. Many librarians worldwide accept them as the foundations of their philosophy. Dr. S.R. Ranganathan conceived the Five Laws of Library Science in 1924. The statements embodying these laws were formulated in 1928. These laws were first published in Ranganathan’s classic book entitled Five Laws of Library Science in 1931. These laws are:
  • First Law: Books Are For Use
  • Second Law: Every Reader His/Her Book
  • Third Law: Every Book Its Reader
  • Fourth Law: Save The Time Of The Reader
  • Fifth Law: The Library Is A Growing Organism

These laws of Library Science are the “fundamental laws” of Library Science. These are applicable to any problem in the areas of library science, library facilities, and library practice. These laws are like pot containing oceans. Prior to their enunciation, the subject of Library Science had no philosophy. These laws gave a philosophical base, guaranteeing an everlasting future to the subject of library science, the profession of librarianship, and the use of libraries. These laws have provided a scientific approach to the subject of library science. Even though S.R. Ranganathan proposed the Five Laws of Library Science before the advent of the digital age, they are still valid and equally relevant today.

3. Answer any one of the following questions in about 40 to 60 words.
(a) In which ways do you think RFID technology can prevent theft of books in libraries?
Ans- Librarians can affix materials with security tags that contain microchips and an antenna that transmits information to a wireless reader using radio frequency identification (RFID) technology.
The technology could one day become as ubiquitous as the bar code.
Unlike bar codes, which need to be scanned manually and read individually, radio ID tags do not require line of sight for reading Multiple tags can be read simultaneously, through packaging or book covers.
With radio ID tags, librarians can automate check-ins and returns Patrons can speed through self-checkout without any assistance or ever even opening a book.
An RFID tag can be read from just inches away. No librarians can simply wave a wireless wand while walking through stacks to record what books are on the shelves, The hand-held unit reads the chips and stores data that can be downloaded into the library’s circulation system, Instead of weeks or months, collection inventory would take just hours.
“Inventory of the collection, normally a time-consuming process, is made easy and quick.” Said Patricia Mackey, librarian for Rockefeller University Library, which uses Checkpoint Systems Intelligent Library System.
Electromagnetic sensors guard library exits, so that only checked out book leave the building. If a book isn’t signed out properly, a hidden RFID tag will trigger the senses and an alarm will sound to alert librarians to a possible theft.
At Rockefeller University Library, a camera videotapes patrons in real time whenever an alarm is triggered, catching action that security guards might miss.
A number of vendors, such as Texas Instruments, Checkpoint Systems, 3M Library Systems and Toys, have introduced RFID technology to the library security market.
But the applications for RFID technology are limitless.
“Fundamentally, the technology can and is being extended well beyond libraries.” Said Doug Karp, senior director of RFID operations and strategic marketing for Checkpoint Systems
4. Answer any one of the following questions in about 100 to 150 words.
(b) Visit website of a public library and a college library on the internet. Give their names and respective URLs. Compare and contrast the two libraries in terms of their:
– Manual and computerized services.
– Web 2.0 tools.
– Remote access facilities.
Ans- 
Manual and computerized facilities.
Many contemporary businesses use a hybrid of the two systems. The manual cioment can range from keeping physical receipts to writing all journal entries by hand, while the computerized element can range from using an electronic cash register to maintaining an entirely digital accounting system.
When choosing an accounting approach for your small business, consider several aspects of accounting: speed, reliability, transparency and simplicity.
Speed of Accounting Systems
Computerized accounting systems are considerably quicker than manual ones. The time required for data entry may be comparable in the two approaches, but a computerized system saves considerable time when tallying results. A computer can generate reports quickly, and you can change parameters by simply clicking and selecting options rather than adding entire columns of numbers. Computerized systems are vulnerable to bugs and glitches, which have the potential to slow you down.
Although a manual system generates data much more slowly, it’s easier predict the amount of time it takes to perform different functions in a manual system.
Reliability of Accounting Systems
The data in a computerized system depends on reliable hardware to track the information you need. When your system crashes or freezes, you may not have access to your records. Regular backups mitigate this risk, but you still have to deal with some unpredictability getting your system back up and running.
Manual accounting systems are kept in ledger books, which are always available for you to use and view. Of course, physical records can be vulnerable as well and can be damaged or misplaced. You can photocopy manual records to keep a backup of sorts, but the process of hacking up a digital file is much simpler.
Transparency of Accounting Systems
Although digital systems can generate sophisticated reports in seconds, it may be difficult to track down difficulties when they occur because calculations are based on preprogrammed back-end calculations. For example, if your system is set up incorrectly, it may be treating some liabilities as assets, and you wouldn’t be able to identify the problem unless you know precisely where to look.
In contrast, it’s easy to see whether an entry into a manual bookkeeping system is being added or subtracted because you’re doing each of these calculations yourself
Simplicity of Accounting Systems
Although some manual systems are sophisticated and some computerized systems are simple, manual system lend themselves well to businesses whose accounting needs are basic and straightforward. Some small businesses don’t need double-entry systems that track every transaction against bank account and credit card statements. They may do perfectly well with single-entry systems that list and categorize sales and expenditures
Web 2.0 tools:
Web 2.0 tools are free digital programs that can be used for creating and sharing student generated projects and products. They are interactive, multi-purpose, easy-to-use digital platforms that encourage students to collaborate with each other or create and share individualized response products.
Web 2.0 tools provide engaging ways students can interact with, and most importantly, learn from course material. They are particularly helpful when aligned to teaching and assessment exercises meant to increase student engagement, require students to summarize information, or verbalize insight into their conceptual understanding through means other than traditional writing exercises.
Web 2.0 tools also provide students an opportunity to interact with others as they share their Knowledge. Students can collaborate with classmates to create response products, or they can Share completed products with peers in their class, students in other section, or other learners Around the world. Web 2.0 tools create opportunities for students to share what they are Learning with a wider audience
Remote access facilities :
A remote access facilities (RAF) is any combination of hardware and software to enable the remote access tools or information that typically reside on a network of IT devices.
A rothote access facilities connects a client to a host computer, known as a remote access server. The most common approach to this facilities is remote control of a computer by using another device which needs internet or any other network connection.
Here are the connection steps:
  1. User dials into a PC at the office.
  2. Then the office PC logs into a file server where the needed information is stored.
  3. The remote PC takes control of the office PC’s monitor and keyboard, allowing the remote user to view and manipulate information, execute commands, and exchange files.

5. Answer any one of the following questions in about 100 to 150 words.

(a) The ‘Whitaker’s Almanack’ is published annually since 1868 from the United Kingdom. Visit the Whitaker website and explain what kind of information is available on it.
Ans-
First publication

Joseph
Whitaker began preparing his Almanack in the autumn of 1868. He postponed
publication of the first edition on learning of the resignation of Benjamin
Disraeli on 1 December 1868, so that he could include details of the new
Gladstone administration. At the same time, Whitaker continued to expand the
information so that the initially planned 329 pages grew to 370. The first
edition of the Almanack appeared on 23 December 1868, priced at I shilling,
introduced by a short editorial piece written by Joseph Whitaker. It began “The
Editor does not put forward this Almanack as perfect yet he ventures to think
that he has succeeded in preparing a work which will commend itself to those
who desire to see improvement in this direction. It concluded by inviting
critics to suggest ways in which improvements could be made. The Manchester
Guardian, reviewing the first edition, described it as “the largest of the
cheap almanacks” to appear, and noted it contained a great deal more valuable
information than other such works. In 2013, the 2014 edition became the first
to be published under the new simpler branding of “Whitaker’s”.

Content

Whitaker’s Almanack consists of articles, lists and tables on a wide range of subjects including education, the peerage, government departments, health and social issues, and the environment.

The largest section is the countries directory, which includes recent history, politics, economic information and culture overviews. Each edition also features a selection of critical essays focusing on events of the previous year. Extensive astronomical data covering the forthcoming year is published at the rear of the book.

Whitaker’s Almanack is an almanac. It is not an encyclopaedia but more of a yearbook of contemporary matters and a directory of various establishments in the UK (such as clubs, public bodies and universities)

Whiker’s was prized enough that Winston Churchill took a personal interest in the continued publication of the book after its headquarters were destroyed in the Blitz: a copy is also sealed in Cleopatra’s Needle on the north bank of the River Thames

Formats

Each year the Almanack is published in two formats – the Standard Edition and a shortened Concise Edition. In previous years, a larger-format of the Standard Edition, bound in leather, was produced for libraries. Both editions were redesigned in 1993 and 2004 to increase the page size and improve legibility

In 2016,
Whitaker’s launched its online edition through its website
rebellion.com/whitakers- almanack which is updated weekly with free to view and
subscription only content as well as Weekly quizzes.

Editors

The Almanack’s current Editor is Michael Rowley

Editors since 1868

There have been eleven editors since 1868

  • Joseph Whitaker 1868-1895
  • Sir Cuthbert Whitaker 1895-1950
  • F. H. C. Tatham 1950-1981
  • Richard Blake 1981-1986
  • Hilary Marsden 1986-1999
  • Lauren Simpson 1999 2004
  • Vanessa White 2001 2002
  • Inna Ward 2004-2008
  • Claire Fogg 2008-2010
  • Ruth Northey 2010-2020
  • Michael Rowley 2020-

6. Prepare any one project of the given below :

(a) Institutional repository is an online database providing access to digital collections of thesis, dissertations, eprints, etc. of an institution for online viewing. Visit the website of IISc – Indian Institute of Science (eprints@iisc.ernet.in). Write down the step-by-step instructions to deposit publications to the IISc repository.

Ans- We provide here step-by-step instructions to deposit your publications to the IISc ePrints repository. Any lise staff (faculty, academic staff, student, or project staff) may submit publications to the repository, You can deposit your publication by one of two methods. A) by e-mail or B) by using the ePrints Sc online submission system.

A. Deposit by E-Mail

You need to
send the electronic publication along with minimal bibliographic information to
JRD library. We will deposit the publication on your behalf after verifying the
eligibility.

B. Deposit yourself (self-archiving) using the ePrints @ IISc online submission system

Follow the three steps explained below for online submission

Step 1. Determine if the publication is eligible for deposit
For a publication to be eligible for deposit to ePrints@iisc, it should meet a few requirements
  1. At least one of the authors must be from IISc.
  2. It should be an acceptable document type.
  3. It should conform to publisher’s copyright policy.

Step 2. Convert publication to acceptable electronic format

Preferred format is Adobe PDF format. It is not usually acceptable to deposit the publisher produced PDF, unless the publisher gives permission to do so. Therefore, you may need to convert a copy of your document to PDF.
Step 3. Deposit the publication
Register (first time) or login-in to User Area
Before you can begin to deposit publications in IISe ePrints, you need to be registered. Once you have completed the registration process, you can access your IISc ePrints User Area using username and password obtained through the registration process and deposit publications,
Registering:
From the lISe ePrints home page (http://eprints.iisc.ac.in/) click on the Register link. This will take you to the Create Account page
  • Enter your preferred username
  • Click on the Submit button

The IISc ePrints system will display a confirming message, and send an email to your email account requesting confirmation of your registration.

When you receive the email, follow the embedded URL to activate your account. The URL Will take you to a IISc ePrints screen, where you will be asked to provide additional details About yourself (your Faculty or Division, Department, office location etc). This information Will not be made public. 
Checking if the publication is already avalable in ePritns @ IISc.
Before proceeding to deposit your publication to ePrintse IISc, first check if it already exists. This can be easily done using the search and browse features of sPrint IISc. If the publication already exists, you should not submit the publication again.
Deposit your publication
From the IISc ePrints home page, (http://eprints.iisc.ac.in/) click on the Deposit tink. The IISc ePrints system will prompt you to login. Enter your username and password
Click on the “Deposit new item” button.
When depositing a publication, you must provide some information about it and this will be used to construct a record for the publication. The information in the record will be made available to the eprint search engines.
Entering the information:
  • For some fields, you can select the appropriate option from a pick-box.
  • For others, you will need to type in or cut and paste the text into the box provided.
  • Some fields may not be relevant, in which case you should leave them blank.
  • Some fields are mandatory and these are marked with a red asterisk.
  • The web form is spread across a mumber of pages. Click on the Next button to navigate to the next page.

The information requested includes:

Deposit type (mandatory)
Select the most appropriate type for your deposit. (eg preprint, journal article, conference Paper, etc.)
Succession/Commentary (optional)
If the publication you are depositing should be linked to any oprints that have already been deposited in IISc ePrints, provide the ID number. This could be where you are depositing a postprint version and you would like it to be linked to the preprint version that is already in the repository. It could also be where the eprint being deposited is a commentary on or critique of another publication that has also been deposited in IISc ePrints. The ID number is displayed in the brief record of each eprint. Search by author or keyword to find the record. If the publication is not linked to any other eprint, leave these fields blank.
After entering all the required information, press the > Next button.
  • If any mandatory information is missing, you will be asked to provide this Information
  • If all required information is present, you will be taken to the Document Storage Formats page where you can add (upload) your document,

Add document

Upload your document to the IISc ePrints server by clicking on the Add Document button Select the appropriate format eg. PDF. Use the Security Level field to indicate how widely it should be made available. Select Anyone unless there are reasons to restrict access. Click >Next.
Document file upload
For PDF files, select File Upload and click on the Upload button. Browse to find your file. Then click on Upload. For HTML files, select Capture from URL Provide the URL where this file can be found. This ensures that all hypertext links in the document will work.
Click on the > Finish button to finish the file upload procedure.
Review your submission details
The Deposit Verification screen displays the brief record for your eprint. Check the record carefully for errors. Pay particular attontion to the reference that the system will create for your document from the information your have entered. The reference will be displayed above the PDF link to your document. Check that the reference contains all the ap appropriate elements (eg author, year, title, journal name or book title etc).
If you wish to make any alterations use the > Back button at the bottom of the screen. Do not use the browser Back button on the toolbar at the top of the screen this will exit you from your IISc ePrints user area.
When you are satisfied that the record is accurate and complete, read the deposit agreement which appears at the end of the page. Clicking on the >Deposit EPrint Now button, indicates your agreement to these terms and completes the deposit process.
Your submission will be checked by the ePrints Sc administrator and, after a few days, it will appear in the public repository.

Leave a Reply

Your email address will not be published. Required fields are marked *