Enlist different biological agents which damage paper based library resources. -Technology

1 Answer

Answer :

The three biological agents that damage paper based library resources are Microorganisms, Insects and Rodents.

Related questions

Description : Based on your assessment, describe the implications of APUPA pattern on library classification? -Technology

Last Answer : a. APUPA stands for Alien-Penumbral-Umbral-Penumbral-Alienb. In this pattern, one arranges the most relevant documents at the centre, provides documents of marginal relevance on both sides of relevant ... This is the best way to maintain filiatory sequencee. APUPA arrangement diagramf. Example . . .

Description : Why should different steps of library classification be followed while classifying a document? -Technology

Last Answer : These steps provide the tool to translate the titles into specific notationTo identify specific subject of the content of the materialTo assign appropriate class number

Description : What shields your face eyes respirtory tract from chemical and biological warfare agents?

Last Answer : A gas mask.

Description : What suggestions do you have to promote free courses in technology and software use at a local library?

Last Answer : Free lunch/breakfast for each participant.

Description : Create a DTD for storing book information for a library. -Technology

Last Answer :

Description : What do you understand by integrated library management system? -Technology

Last Answer : An integrated library management system is a library automation system in which data is entered in one module to avoid data redundancy. It integrates all the library activities, routine operations and information retrieval operations of a library.

Description : What is the main purpose of library classification? -Technology

Last Answer : The main purpose of Library classification is to facilitate the use of reading material. It confirms the exact location of a document in the library.

Description : What are the various modes of library acquisition? -Technology

Last Answer : The various modes of library acquisitions are as follows:i. purchase;ii. Gift;iii. Exchange;iv. Online acquisition;v. Consortia based acquisition; andvi. Library consortia

Description : Why do we need human resource planning in library? -Technology

Last Answer : For maximum utilization of the library, it is essential to have a well-trained and highly motivated staff. This enables the effective use of the sources of the library and the meeting of the demands of the community. Therefore, we need human resource planning.

Description : Under which situation does reservation of a particular library resource takes place? -Technology

Last Answer : Reservation of particular library resources takes place only if the documents are not available for borrowing as they are issued to another member or sent for binding or otherwise unavailable.

Description : What is the difference between manual library system and automated library system? -Technology

Last Answer : In the manual library system, the library services are provided to the users without using computers as an intermediary. However, in the automated library system, the traditional library activities and library services are completely mechanized.

Description : State the need for technical processing of library materials. -Technology

Last Answer : Technical processing of library material is needed because of the following reasons: (i) to differentiate from the library material to non-library materials;(ii) to find out the physical condition of the newly ... books on the actual position on the shelves;(iv) to locate the books on the shelves.

Description : Why do librarians select open source library automation software? -Technology

Last Answer : Librarians select open source library automation software because of following advantages:i. It is normally available free of cost;ii. One can download it with the help of its source code for any type of library usageiii. One is allowed to modify its source code for satisfying his/ her requirements.

Description : How can we reduce man_made disasters in a library? -Technology

Last Answer : There are certain human activities which destroy the library resources. Such activities may be intentional, unintentional or due to ignorance towards the upkeep of building and its parts, equipments and ... in the library. As far as possible conditions like war and invasion should be avoided.

Description : How is stock verification conducted in a library? -Technology

Last Answer : There are several methods of stock verifications :a. Accession Number approach- checks books on shelves on the basis of accession number, conducted by(i) Accession register,(ii) Using separate ... data collection unit meant for RFID and data put into library automation software, reports are ready.

Description : How has the internet provided opportunities to serve library members round the clock? -Technology

Last Answer : a. Internet provides access to the library and its services round the clock as it gives accessibility to the members from remote.b. Searching library resources- web-OPACc. Renew of issued materialsd. ... can check the status of his/her request, complain, suggestion, etch. Online payment, if any.

Description : Obama is in Cuba. Cuba is a former Soviet satellite nation, and still has good relations with Russia. Is there any danger that Putin will have his agents try and damage Obama?

Last Answer : answer:Putin is not in love with the USA enough to make that a reality. He understands very well Napoleon’s dictum to “Never interfere with your enemy when he is making a mistake.” And having Obama as our president is our mistake.

Description : Which of the following is not a right of the principal? a. Right to recover damage b. Right to demand account and to claim secret profit made. c. Right to remuneration d. To resist agent’s claim for indemnity.

Last Answer : c. Right to remuneration

Description : The maximum biological damage is produced by – (1) X rays (2) gamma - rays (3) beta - rays (4) alpha - rays

Last Answer : (2) gamma - rays Explanation: Gamma radiation, also known as gamma rays, is electromagnetic radiation of high frequency and therefore high energy. Gamma rays are ionizing radiation and are thus biologically hazardous.

Description : Maximum biological damage occours due to

Last Answer : Gama Rays

Description : Biological shield is provided in a nuclear power reactor to protect the __________ from radiation damage. (A) Fuel elements (B) Operating personnels (C) Walls of the reactor (D) None of these

Last Answer : (B) Operating personnels

Description : Biological shield is provided in a nuclear power reactor to protect the __________ from radiation damage. (A) Fuel elements (B) Operating personnels (C) Walls of the reactor (D) None of these

Last Answer : (B) Operating personnels

Description : Which is the cause of damage to relative biological effectiveness? (a) High temperature (b) Pollution (c) Radiation (d) Low temperature

Last Answer : (b) Pollution

Description : The maximum biological damage is produced by (1) X – rays (2) gamma – rays (3) beta – rays (4) alpha – rays

Last Answer : gamma – rays

Description : If your computer attacked by a trojan horse virus, what damage it may cause? -Technology

Last Answer : If your computer attacked by a trojan horse virus, it can:1. Steal passwords2. Copy sensitive data3. Carry out any other harmful operations etc.

Description : The at first glance will appear to be useful software but will actually do damage once installed or run on your computer. -Technology

Last Answer : (c) The Trojans are unauthorized programs placed inside a legitimate application.

Description : If you have been given the additional responsibility of the school library, you think that Options: A) You are the exclusive reader as you are the exclusive worker there B) It is the right of ... the resources of library D) It is the right of all the teachers to make appropriate use of library

Last Answer : A) You are the exclusive reader as you are the exclusive worker there 

Description : Which of the listed groups of electrical insulation materials is best suited for the highest operating temperatures? A. impregnated cotton and silk B. unimpregnated paper and cotton C. pure glass and quartz D. mica and porcelain with bonding agents

Last Answer : Answer: C

Description : If a book is in my library on the Kindle app, does that mean it is downloaded (Read details)?

Last Answer : Yes, I believe so. It works for me. I use an actual Kindle, not an app on a tablet, and once a book is downloaded, I can read it anywhere.

Description : You got a brand-new, fully-functional replicator with a built-in fusion generator, outfitted with a library of everyday items and a modelling system to let you make your own stuff. What do you make first?

Last Answer : TPS reports. If I make enough in advance, then I can have all of my Fridays off.

Description : How do you add songs to an ipod without erasing the songs from a separate library?

Last Answer : The software assumes that a new library means a new song selection. The purpose of erasing old is to make room for new. Its not a glitch, but the way Apple designed iTunes. Option 1. Load all of ... move old computer's songs from the ipod to the new computer. Add the newly imported songs to iTunes.

Description : When we place fossil specimens into different species based on their physical appearance, we are using the ___________ concept. A) biological species B) paleospecies C) anagenetic species D) monospecies

Last Answer : B) paleospecies

Description : Which of the following combinations represent renewable natural resources? (A) Oil, forests and tides (B) Fertile soil, fresh water and natural gas (C) Clean air, phosphates and biological diversity (D) Fishes, fertile soil and fresh water

Last Answer : (D) Fishes, fertile soil and fresh water

Description : ……….. is a computer which provides sharing the resources of other computers connected in a network. -Technology

Last Answer : Serveris a computer which provides sharing the resources of other computers connected in a network.

Description : CPU time, memory space are the examples of system resources. -Technology

Last Answer : TrueSystem resources include many resources such as CPU time, memory space, I/O address, DMA channel to alert the need of hardware and software.

Description : The time_sharing operating system allows multiple programs share the computer resources simultaneously. -Technology

Last Answer : TrueIn time-sharing OS, a small amount of time is allocated for the processing simultaneously.

Description : ………. attack eats up all the resources of a system and halts it. -Technology

Last Answer : Denial of serviceattack eats up all the resources of a system and halts it.

Description : Information and other resources can be modified only by those users, -Technology

Last Answer : Security and Integrity of information ensures that information and other resources are modified only by those users, who have the authority of making changes in the data.

Description : What are the various ethical concerns that originate with the use of electronic text, multimedia sharing, and other on line resources? -Technology

Last Answer : a. Digital material are prone to be misused easilyb. Ethical practices necessitate that the use of any digital materials, multimedia or online material be done as per the law of the landc. ... digital, multimedia or online resources of public domain is punishable offence, hence should be avoided.

Description : ……… is used to translate scanned images of handwritten, type written or special type of font printed on a conventional paper. -Technology

Last Answer : OCR is used to translate scanned images of handwritten, type written or special type of font printed on a conventional paper.

Description : The printed information on the paper is called …….. -Technology

Last Answer : The printed information on the paper is called hardcopy.

Description : The ………. prints its output on special heat sensitive paper. -Technology

Last Answer : The thermal printer prints its output on special heat sensitive paper.

Description : The distance between the text and the paper edge is called indent. -Technology

Last Answer : FalseThe distance between the text and the paper edge is called the margin.

Description : Fibrinolytic therapy is based on activation of plasminogen, the inactive proteolytic enzyme of plasma that binds to fibrin during the formation of thrombosis. Activation of plasminogen to plasmin results ... TPA all exceed 30 minutes d. Streptokinase is significantly cheaper than urokinase or TPA

Last Answer : Answer: a, b, d Streptokinase is a bacterial protein produced by group C b-hemolytic streptococci. It is therefore antigenic in humans and can be associated with allergic reaction in ... one agent over the other. Streptokinase however, is markedly less expensive than either urokinase or TPA

Description : Which among the below specified illustrations belongs to the category of GUI based user agents? a. mail b. pine c. Outlook & Netscape d. All of the above

Last Answer : c. Outlook & Netscape

Description : Which among the below specified illustrations belongs to the category of GUI based user agents? A. mail B. pine C. Outlook D. All of the above

Last Answer : C. Outlook

Description : Walton Food Products decided to use agents to reach industrial accounts several years ago. Logically, this decision was based on which one of the following? A)Steady demand for the firm's ... C)Walton's desire to reduce selling costs D)The willingness of agents to provide market information

Last Answer : C)Walton's desire to reduce selling costs

Description : If all of humanity were to be instantly and irreversibly sterilised tomorrow, locking in biological extinction for the species, how long would it take for humans to turn themselves into robots?

Last Answer : I’m not sure “robots” is the term. The better question is “how long would it take humans to turn into wild animals?” 30 days or less.

Description : The phrase 'tragedy of commons’ is in the context of (A) tragic event related to damage caused by release of poisonous gases. (B) tragic conditions of poor people. (C) degradation of renewable free access resources (D) climate change

Last Answer : (C) degradation of renewable free access resources

Description : Software feasibility is based on which of the following (A) business and marketing concerns (B) scope, constraints, market (C) technology, finance, time, resources (D) technical prowess of the developers

Last Answer : (C) technology, finance, time, resources