top of page
MLI-101: Information, Communication and Society

MLI-101: Information, Communication and Society

IGNOU Solved Assignment Solution for 2023-24

If you are looking for MLI-101 IGNOU Solved Assignment solution for the subject Information, Communication and Society, you have come to the right place. MLI-101 solution on this page applies to 2023-24 session students studying in MLIS courses of IGNOU.

Looking to download all solved assignment PDFs for your course together?

MLI-101 Solved Assignment Solution by Gyaniversity

Assignment Solution

Assignment Code: MLI-101/AST/TMA/Jul.2023-Jan.2024

Course Code: MLI-101

Assignment Name: Information, Communication and Society

Year: 2023-2024

Verification Status: Verified by Professor



Q1) Define ‘information’. Discuss its types.

Ans) Information refers to data that is processed, organized, and meaningful, providing knowledge and understanding. It is the result of interpreting and contextualizing raw data, making it valuable for decision-making and problem-solving. Information is a crucial element in various fields, including technology, business, education, and communication.


Types of Information

  1. Primary Information: Original data collected firsthand for a specific purpose.

    Example: Surveys, interviews, experiments.

  2. Secondary Information: Data obtained from existing sources, not collected directly for the current purpose.

    Example: Books, articles, reports.

  3. Quantitative Information: Information expressed in numerical terms, involving quantities and measurements.

    Example: Sales figures, temperatures, survey responses.

  4. Qualitative Information: Descriptive information, often non-numeric, providing insight into qualities, characteristics, or attributes.

    Example: Descriptions, observations, opinions.

  5. Structured Information: Well-organized and formatted data, often found in databases or tables.

    Example: Spreadsheets, databases.

  6. Unstructured Information: Data lacking a specific format or organization, often in the form of text.

    Example: Text documents, emails.

  7. Tactical Information: Information used for short-term decision-making and day-to-day operations.

    Example: Daily sales reports, production schedules.

  8. Strategic Information: Information used for long-term planning and decision-making at the organizational level.

    Example: Market trends, competitor analysis.

  9. Internal Information: Information related to the internal operations of an organization.

    Example: Employee records, financial reports.

  10. External Information: Information from external sources, such as the market, competitors, or the environment.

    Example: Market research reports, industry trends.

  11. Processed Information: Data that has undergone analysis and interpretation to derive meaningful insights.

    Example: Analytical reports, summaries.

  12. Raw Information: Original, unprocessed data that has not undergone analysis.

    Example: Raw survey responses, unprocessed sensor data.

  13. Sensory Information: Information obtained through the human senses (sight, sound, touch, taste, smell).

Example: Visual observations, auditory data.


Q2) Explain the salient features of information economy.

Ans) The information economy is characterized by the production, distribution, and use of information as a primary economic resource.


Salient features of an information economy include:

  1. Knowledge Intensity:

    • Information-driven activities require a high level of knowledge and expertise.

    • Industries focus on creating, disseminating, and applying knowledge for economic value.

  2. Digital Technologies:

    • Heavy reliance on digital technologies for the creation, storage, and transmission of information.

    • Internet, computers, and communication technologies play a central role in economic activities.

  3. Innovation and Creativity:

    • Emphasis on innovation and creativity as key drivers of economic growth.

    • Continuous development of new ideas, products, and services is essential.

  4. Globalization:

    • Information can be shared globally, leading to a more interconnected and interdependent global economy.

    • Cross-border collaborations and partnerships are common.

  5. Intellectual Property:

    • Recognition and protection of intellectual property rights are crucial.

    • Patents, copyrights, and trademarks safeguard information-based assets.

  6. Data as a Resource:

    • Data is treated as a valuable resource for decision-making and strategy development.

    • Big data analytics and data-driven insights inform business strategies.

  7. Flexibility and Adaptability:

    • Rapid changes in technology and information require flexibility and adaptability.

    • Businesses need to adjust quickly to stay competitive.

  8. Services Dominance:

    • A shift from manufacturing-centric to service-centric economic activities.

    • Services such as software development, consultancy, and information services dominate.

  9. Human Capital Importance:

    • Highly skilled human capital is critical for success.

    • Education and training are essential for participation in the information economy.

  10. Network Effects:

    • Network effects play a significant role, where the value of a product or service increases with the number of users.

    • Social networks, online platforms, and communication tools exemplify this feature.

  11. Economic Value of Information:

    • Information is considered a source of economic value and a key factor of production.

    • The ability to leverage information efficiently contributes to competitiveness.

  12. E-commerce and Digital Transactions:

    • Prevalence of online commerce and digital transactions.

    • E-commerce platforms facilitate buying and selling of goods and services online.

  13. Job Transformations:

    • Shifts in the nature of jobs, with an increased focus on knowledge-based and information-intensive roles.

    • New job categories emerge, and existing ones evolve.

  14. Cybersecurity Concerns:

    • Growing importance of cybersecurity to protect sensitive information from unauthorized access and cyber threats.

  15. Information Access:

  • Increased emphasis on open access to information and knowledge sharing.

  • Collaboration and information exchange contribute to innovation.


Q3) Define and explain the term 'communication’. Enumerate the types of communication and describe each type.

Ans) Communication is the process of exchanging information, ideas, thoughts, or feelings between individuals or groups through various mediums. It involves the sender encoding a message and transmitting it through a chosen channel to a receiver who decodes and interprets the message. Effective communication is essential for conveying intentions, understanding perspectives, and building relationships.


Types of Communication

  1. Verbal Communication: Verbal communication involves the use of spoken or written words to convey messages. It includes face-to-face conversations, telephone calls, presentations, and written documents. Clarity in verbal communication is crucial to avoid misunderstandings.

  2. Non-Verbal Communication: Non-verbal communication utilizes gestures, body language, facial expressions, and other visual cues to convey messages. It complements verbal communication and can provide additional context and meaning to the spoken words.

  3. Written Communication: Written communication involves the use of written words in various forms such as emails, letters, reports, or memos. It is a formal and documented way of conveying information, providing a record for future reference.

  4. Visual Communication: Visual communication utilizes visual elements like charts, graphs, images, or videos to convey information. It is effective for presenting complex data in a comprehensible format and is commonly used in presentations and reports.

  5. Interpersonal Communication: Interpersonal communication occurs between individuals and focuses on building relationships. It involves active listening, empathy, and the exchange of thoughts and feelings. Face-to-face conversations exemplify interpersonal communication.

  6. Intrapersonal Communication: Intrapersonal communication is the internal dialogue that individuals have with themselves. It involves self-reflection, introspection, and the processing of thoughts and emotions within one's own mind.

  7. Group Communication: Group communication involves interactions within a group or team. It can occur in meetings, discussions, or collaborative projects. Effective group communication requires coordination and collaboration among group members.

  8. Mass Communication: Mass communication involves the dissemination of information to a large audience through mass media channels such as television, radio, newspapers, and the internet. It has a broad reach and influences public opinion.

  9. Digital Communication: Digital communication utilizes electronic devices and online platforms for exchanging information. It includes emails, social media, instant messaging, and video conferencing. Digital communication enables quick and widespread connectivity.

  10. Formal Communication: Formal communication follows established channels within an organization. It includes official memos, reports, and structured meetings. Formal communication is often documented and adheres to organizational protocols.

  11. Informal Communication: Informal communication occurs casually and spontaneously without adherence to formal structures. It includes water-cooler conversations, social interactions, and informal gatherings. Informal communication fosters camaraderie and a sense of community.


Q4) What is ‘knowledge management’? Explain knowledge management systems.

Ans) Knowledge management (KM) is the systematic process of creating, organizing, sharing, and applying an organization's intellectual assets to enhance its overall performance. It involves the identification, capture, storage, and dissemination of knowledge within an organization to improve decision-making, innovation, and efficiency. KM encompasses both explicit knowledge (codified and documented information) and tacit knowledge (personal insights and experiences).


Knowledge Management Systems

Knowledge Management Systems (KMS) are information systems designed to facilitate the management of organizational knowledge. These systems leverage technology to capture, store, organize, and distribute knowledge across the organization.


There are several components and features associated with knowledge management systems:

  1. Knowledge Capture: KMS enables the capture of both explicit and tacit knowledge. Explicit knowledge is often documented in databases, documents, and repositories, while tacit knowledge may be captured through collaborative tools, discussions, and personal insights.

  2. Knowledge Storage: KMS provides a centralized repository for storing knowledge assets. This can include databases, intranets, wikis, and document management systems. Proper categorization and indexing facilitate easy retrieval.

  3. Knowledge Organization: Effective KM involves organizing knowledge in a structured manner. Taxonomies, metadata, and tagging systems help categorize information, making it accessible and understandable to users.

  4. Knowledge Retrieval: KMS includes search functionalities that allow users to retrieve relevant knowledge quickly. Advanced search algorithms and filters enhance the precision of information retrieval.

  5. Collaboration Tools: Collaboration features in KMS encourage team members to share ideas, insights, and experiences. Discussion forums, collaborative document editing, and virtual team spaces foster knowledge exchange.

  6. Expertise Location: KMS often includes tools to identify and locate experts within the organization. This helps connect individuals with specific knowledge or skills to those seeking assistance or information.

  7. Workflow Integration: Integration with organizational workflows ensures that knowledge is seamlessly incorporated into daily processes. This integration enhances the applicability and relevance of knowledge within the organization.

  8. Knowledge Dissemination: KMS facilitates the dissemination of knowledge through various channels. This can include newsletters, alerts, training programs, and internal communications to ensure that employees are aware of and have access to relevant information.

  9. Performance Metrics: KMS includes metrics and analytics to measure the effectiveness of knowledge management initiatives. This includes tracking usage, contributions, and the impact of knowledge on organizational outcomes.

  10. Security and Access Controls: Given the sensitive nature of some knowledge assets, KMS incorporates security features and access controls. This ensures that confidential information is protected, and access is granted based on roles and permissions.

  11. Continuous Improvement: KMS supports continuous improvement by encouraging feedback and updates to knowledge repositories. Regular reviews and updates ensure that knowledge remains accurate and up to date.


Q5) Write short notes on any two of the following:


Q5. a) Information Policy

Ans) Information policy refers to a set of rules, guidelines, and principles established by an organization, government, or entity to govern the acquisition, use, storage, dissemination, and disposal of information. It provides a framework for managing information resources efficiently, ethically, and securely. Information policies are crucial for ensuring compliance with legal regulations, safeguarding sensitive data, and promoting responsible information practices.


Key Components of Information Policy:

  1. Data Governance: Information policies often include provisions for data governance, outlining how data is managed, who has access to it, and the processes for maintaining data quality and integrity.

  2. Security Measures: Policies detail security measures to protect information assets from unauthorized access, disclosure, alteration, or destruction. This encompasses encryption, access controls, firewalls, and other cybersecurity practices.

  3. Privacy Guidelines: Information policies address privacy concerns, specifying how personal or sensitive information should be handled, shared, and protected. Compliance with data protection laws is a key aspect of privacy guidelines.

  4. Information Lifecycle Management: Policies define the lifecycle of information from creation to disposal. This includes guidelines on data retention, archiving, and the secure destruction of information when it is no longer needed.

  5. Compliance and Legal Obligations: Information policies ensure compliance with relevant laws, industry regulations, and contractual obligations. They guide organizations in meeting legal requirements related to data protection, intellectual property, and other information-related matters.

  6. User Responsibilities: Policies outline the responsibilities of users in handling information. This may include guidelines for ethical use, proper data handling practices, and reporting procedures for potential breaches or incidents.

  7. Information Access and Sharing: Policies specify who has access to what information and under what circumstances. They also address the sharing of information within and outside the organization, emphasizing the need for responsible sharing practices.

  8. Training and Awareness: Organizations often include provisions for training programs to ensure that employees are aware of information policies and understand their role in maintaining information security and compliance.

  9. Incident Response: Policies establish protocols for responding to information security incidents or breaches. This includes reporting procedures, investigation processes, and actions to mitigate the impact of incidents.

  10. Audit and Monitoring: Policies may include provisions for regular audits and monitoring activities to assess compliance with information policies. This helps identify areas for improvement and ensures continuous adherence to established guidelines.


Q5. b)Text Mining

Ans) Text mining, also known as text analytics or natural language processing (NLP), is a data analysis technique that involves extracting meaningful information and patterns from unstructured textual data. Unstructured data includes documents, articles, emails, social media posts, and other text sources. Text mining employs a combination of linguistic, statistical, and machine learning methods to transform raw text into structured and actionable insights.


Key Components of Text Mining:

  1. Text Preprocessing: Before analysis, raw text undergoes preprocessing steps such as tokenization, stemming, and removal of stop words to convert it into a more manageable format.

  2. Entity Recognition: Identifying entities, such as names, locations, and organizations, within the text is crucial for understanding the context and relationships in the data.

  3. Sentiment Analysis: Sentiment analysis determines the emotional tone expressed in the text, categorizing it as positive, negative, or neutral. This is valuable for assessing public opinion and customer sentiment.

  4. Topic Modelling: Topic modelling algorithms identify, and extract topics or themes present in a collection of documents. This helps in understanding the main subjects discussed in the text.

  5. Text Classification: Text classification involves categorizing documents into predefined categories or labels. Machine learning models are often used to automate this process.

  6. Named Entity Recognition (NER): NER identifies and classifies entities such as names, dates, and locations within the text. This aids in extracting structured information from unstructured content.

  7. Clustering: Clustering techniques group similar documents together based on content similarity. This helps in organizing large datasets and discovering patterns.

  8. Information Extraction: Information extraction involves identifying and extracting specific information, facts, or relationships from the text, contributing to the creation of structured databases.

  9. Text Summarization: Text summarization algorithms generate concise summaries of longer documents, making it easier for users to grasp the main ideas quickly.


Applications of Text Mining:

  1. Business Intelligence: Text mining helps organizations gain insights from customer feedback, social media, and market trends, enabling better decision-making and strategic planning.

  2. Healthcare: In the healthcare sector, text mining is used for extracting valuable information from medical records, research papers, and clinical notes, contributing to patient care and research.

  3. Customer Feedback Analysis: Analysing customer reviews and feedback from various sources helps businesses understand customer preferences, identify issues, and enhance product or service quality.

  4. Fraud Detection: Text mining is employed in financial services to detect patterns of fraudulent activities by analysing unstructured data such as transaction notes and communications.

  5. Legal Document Analysis: Law firms and legal departments use text mining to analyse vast amounts of legal documents, facilitating legal research and contract review.

100% Verified solved assignments from ₹ 40  written in our own words so that you get the best marks!
Learn More

Don't have time to write your assignment neatly? Get it written by experts and get free home delivery

Learn More

Get Guidebooks and Help books to pass your exams easily. Get home delivery or download instantly!

Learn More

Download IGNOU's official study material combined into a single PDF file absolutely free!

Learn More

Download latest Assignment Question Papers for free in PDF format at the click of a button!

Learn More

Download Previous year Question Papers for reference and Exam Preparation for free!

Learn More

Download Premium PDF

Assignment Question Papers

Which Year / Session to Write?

Get Handwritten Assignments

bottom of page