-
For use as protection from gas leaking from a refrigeration unit,each ship must be equipped with a().
A . portable ventilation system
B . flame safety lamp
C . self-contained breathing apparatus
D . gas mask
-
When anchoring,good practice requires 5 to 7 fathoms of chain for each fathom of depth. In deep water you should use().
A . the same ratio
B . more chain for each fathom of depth
C . less chain for each fathom of depth
D . two anchors with the same ratio of chai
-
()uses one or two high pressure pumps for all the cylinders with one more standby, while()have a separate high-pressure pump for each cylinder.
A . A common rail engine;conventional engines
B . A conventional engine;common rail engines
C . A marine diesel engine;most other engines
D . A two-stroke engine;four-stroke engine
-
Your network contains 200 servers that run Windows Server 2008 R2. You need to archive the Security log for each server on a daily basis. Which tool should you use?()
A . Netsh
B . Secedit
C . Wecutil
D . Wevtutil
-
Hoses used for cargo transfer operations must be tested and inspected at specified intervals by().
A . a representative of the Captain of the Port
B . the operator of the vessel or facility
C . a representative of the National Cargo Bureau
D . low inert gas temperature
-
Each machine in the internet is assigned a unique network address,called(),that is used to identify the machine for communication purposes
A . A、MAC address
B . B、IP address
C . C、host address
D . D、domain name address
-
You need to use the Event Viewer window to review the event logs for only critical and error events. You also need the maximum amount of detail for each of these events. What should you do? ()
A . Edit the filter for the Administrative Events view.
B . Create a custom view. Enable the Critical, Error, and Information level events. Select all logs.
C . Create a custom view. Select the Critical checkbox, Error checkbox, and Verbose checkbox. Select all logs.
D . Search for the Critical or Error string by using the Find option of the Administrative Events view.
-
Which of the fuel injection systems listed uses a spring loaded differential spray needle valve and individual pump for each cylinder?()
A . Common-rail injection
B . Air injection
C . Jerk pump injection
D . Distribution injectio
-
Writing a comment after each lesson is a useful habit for a teacher to get into.()
A . 正确
B . 错误
-
When fire pumps are used for other than firefighting service,each pipe connecting the other service (except for branch lines used for deck washing) must have a().
A . check valve installed in the line
B . shut off valve at a manifold near the pump
C . quick disconnect union within ten feet of the pump
D . regulator in the line set at 125 psi
-
A fire hose with a nozzle attached must be connected to each hydrant except when exposed to heavy weather or when the().
A . fire hose might be damaged by cargo operations
B . vessel is in port
C . fire-main system is not charged
D . fire pumps are used for purposes other than supplying water to the fire mai
-
You installed WebLogic, SOA Suite, and Oracle Service Bus on a machine and want to use the WebLogic Node Manger to start servers for each product. Which statement is true?()
A . You need to install a separate node manager for each Middleware Home that has a unique major and minor WebLogic Version Number.
B . You need to install and configure only one instance of Node Manager for all products, regardless of the WebLogic version number.
C . You need to install and configure a separate Node Manager for each domain of each product you want to run on the machine.
D . You need to install one Node Manager but use separate SSL certificates for each product when searching the network communication to the machine
-
Each hose in the fuel transfer system for helicopter refueling must have a().
A . static grounding device
B . quick-disconnect nozzle
C . splash guard
D . vapor recovery system
-
Hoses used for cargo transfer operations must be tested abdinspected at specified intervals by ().
A . a representative of the Captain of the Port
B . the operator of the vessel or facility
C . a representative of the National Cargo Bureau
D . a representative of the American Bureau of Shipping
-
The transportation department requested a shipping cost report to list the resources used by each department. A separate page should be product for each department. Which property would you modify to achieve these results?()
A . Minimum widow records.
B . Column mode.
C . Spacing
D . Print direction.
E . Source F maximum records per page.
F . Maximum records per page.
-
A customer has multiple application servers which create one process for each connected user. All users share the same AIX environment. What is a benefit of using WPARs in this environment?()
A . WPARs give more controls for resource management than the traditional AIX operating system tools.
B . WPARs support Live Application Mobility which can be used to balance user processes acrosssystems.
C . WPARs each have a copy of the AIX kernel, offering better availability than a system without WPARs.
D . WPARs provide the ability to apply fixes specific for each environment, enabling the customer to create specialized application servers.
-
What is the default metric used on IS -IS routers for each interface?()
A . The cost is set to 10 for all interfaces.
B . The cost is set to 10 for LAN interfaces and 20 for WAN interfaces.
C . The cost is based on the speed of the interface.
D . The cost is based o n a composite of bandwidth and delay of the interface.
-
Each of the following should be used as a guideline for using visual aids to a presentation EXCEPT
-
Write two sentences for each place. Use near, across from,next to, in front of, behind, or between.Where is your house?
-
Directions: Read the following sentences and decide whether they are correct or proper in language use. Then write Y for yes and N for no in the brackets. 11,000 MDA-MB-231 cells were cultured in each well for 24 hours.
-
Click the Exhibit button to examine the structures of the EMPLOYEES and TAX tables.You need to find the percentage tax applicable for each employee. Which SQL statement would you use?()
<img src='https://img2.soutiyun.com/shangxueba/ask/17133001-17136000/17135988/ea49d0916fc0345195a85a9b2816cb50.jpg' />
A.SELECT employee_id, salary, tax_percent FROM employees e JOIN tax t ON e.salary BETWEEN t.min_salary AND t.max_salary;
B.SELECT employee_id, salary, tax_percent FROM employees e JOIN tax t WHERE e.salary > t.min_salary AND < t.max_salary;
C.SELECT employee_id, salary, tax_percent FROM employees e JOIN tax t ON (MIN(e.salary) = t.min_salary AND MAX(e.salary) = t.max_salary);
D.You cannot find the information because there is nocommon column between the two tables.
-
Questions 33-36Complete the table using NO MORE THAN THREE WORDS for each answer. 【33】
Questions 33-36
Complete the table using NO MORE THAN THREE WORDS for each answer.
<img src='https://img2.soutiyun.com/shangxueba/ask/11019001-11022000/11020376/ct_ei_007(20095).jpg' />
【33】
-
In computing, passwords are commonly used to limit access to official users. Yet the widespread use of passwords has serious drawbacks. Office workers now have to remember an average of twelve system passwords. In theory they should use different passwords for each site, but in reality these would be impossible to remember, so many people use the same password for all.
An additional problem is that the majority use simple words such as "hello", or names of family members, instead of more secure combinations of numbers and letters, such as 6ANV76Y. This permits computer hackers to download dictionaries and quickly find the word that allows them access.
When system users forget their passwords there is extra expense in supplying new ones, while if people are forced to change passwords frequently they often write them down, making systems even less secure. Therefore, it is clear that the idea of passwords, which have been used as security devices for thousands of years, may need rethinking.
One possible alternative has been developed by the American firm Real User, and is called "passfaces". In order to access the system a worker has to select a series of photographs of faces from a randomly (随机地) generated sequence. If the pictures are selected in the correct order, access is granted. This concept depends on the human ability to recognize and remember a huge number of different faces, and the advantage is that such a sequence cannot be told to anyone or written down, so is more secure. It is claimed that the picture sequence, which used photographs of university students, is easier to remember than passwords, and it has now been adopted for the United States Senate.
What is the disadvantage of passwords as mentioned in Paragraph 1?
A.They do not ensure security.
B.They are difficult to remember.
C.They have to be changed frequently.
D.They limit computer accessibility.
-
For a theory to be useful, it must be confirmed in each test case.()
是
否