User approaches - need for catalogue entries, Other Management

Assignment Help:

User Approaches 

We have seen the purpose and functions of a catalogue. By using a library catalogue we can find out the various documents available in the library, without physically going through every rack and stack of the library collection. We can know 

1)  whether a book or document whose title is known to us is available in the library. This is called 'title approach' of the user. 

2)  whether a book or document written by a particular author is available or not. This is called 'author approach' of the user. 

3)  the available literature on a particular subject of our interest in the library. This is called 'subject approach'. 

Yet, there is another approach known as 'series approach'. 

In the Glossary given in Appendix D of AACR-2, you will find the definition of a "series". In brief, separate items of documents related to one another and having a common collective title in addition to their own titles are said to belong to a series. Again, each of two or more volumes of lectures, essays, articles or other writings which are similar in character and issued in a sequence also comprise a series. 

Reputed publishers bring out standard books, monographs and reports in a series. They are valuable for their continuity, authority, and usefulness. A user may be very anxious to read a new document published in a series the moment it is acquired by the library. This approach of the user is known as 'series approach'. 

Examples of Series are: 

1) McGraw-Hill Series of Science and Technology 

2) Sarada Ranganathan Endowment Lectures 

You know that the library catalogue not only takes care of the different approaches of the users but also provides all possible information about a document to the user. It takes care of even possible variations in spelling and usage of personal names of authors. As you go further into the lessons you will appreciate the ways in which cataloguing practice visualizes and anticipates the problems from the point of view of a library user. 


Related Discussions:- User approaches - need for catalogue entries

Discuss codes of ethics established by the wto, Question 1: Mention and...

Question 1: Mention and discuss three important codes of ethics established by the World Tourism Organisation regarding tourism development with respect to the facilities pr

Explain what the term preventive legal management address, Question 1: ...

Question 1: (a) Explain what the term "preventive legal management" addresses. (b) Describe any 5 stakeholders that have a legal relationship within the hospitality indust

How is strategy to be implemented, QUESTION 1- What is strategy impleme...

QUESTION 1- What is strategy implementation and what problems may arise in implementing a strategic change? 2- Who implements strategy in the organisation and how can the be

Facility and building management, sir,How to prepare the facility managemen...

sir,How to prepare the facility management exam assignment?

Call number - library classification , Call Number: The call numbers' ...

Call Number: The call numbers' for a document consists of three elements, viz.,class number, book number and collection number. The following example will show the presence of

HEALTH INFORMATION MANAGEMENT, WHAT IS A RECORD FORMAT THAT DIVIDES THE RE...

WHAT IS A RECORD FORMAT THAT DIVIDES THE RECORD INTO SECTIONS?

Legal aspects of health care management, 1. What is meant by the term "stan...

1. What is meant by the term "standard of care" in the context of medical liability? Provider examples as to the application of this legal term. How is this standard determined and

Selective dissemination of information (sdi), Selective Dissemination of In...

Selective Dissemination of Information (SDI): The SDI is a type of current awareness service, the objective of which is to keep users of the system informed of new development

Explain how cryptography works, a) Differentiate between encryption and dec...

a) Differentiate between encryption and decryption. b) Explain how cryptography works. c) List down three examples of symmetric key algorithms and two examples of asymmetric

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd