【单选题】
令步骤 4 进行量测,并读出量测值 ___
A. 步骤 2 启开打印机开关
B. 步骤 2 启开复印机开关
C. 步骤 2 启开电脑开关
D. 步骤 2 启开扫描仪开关
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
三个轴之位移量测系统经数据处理器或计算机等计算出 的各点坐标(x,y,z) 及各项功能量测的仪器 ___
A. 工件
B. 重量
C. 数据
D. 位置
【单选题】
数控机床的定位精度主要检测单轴定位精度、单轴重复定位精度和两轴以上联动加工出试件的 ___
A. 圆度
B. 表面粗糙度
C. 平行度
D. 平面度
【单选题】
泵浦可激活介质内部的一种 ,使其在某些能级间实现粒子数反转分布,这是形成激光的前提条件 ___
A. 粒子
B. 分子
C. 原子
D. 电子
【单选题】
垂直度实际轴线必须位于 于基准平面,且在给定的方向上,距离为公差值 0.1mm的另平行平面之间,如下图所示 ___
A. 垂直
B. 平行
C. 相交
D. 交叉
【单选题】
下图显示,实际面(或轴线)必须位于距离为公差值 0.05,且 于基准平面的两平行面之间 ___
A. 平行
B. 相交
C. 垂直
D. 相贯
【单选题】
同轴度公差用于控制轴类零件的被测轴线相对 轴线的同轴度误差 ___
A. 基准
B. 标准
C. 位置
D. 尺寸
【单选题】
铣刀切削时直接推挤切削层金属并控制切屑流向的刀面称为 ___
A. 前刀面
B. 切削平面
C. 后刀面
D. 基面
【单选题】
通常说刀具锐利,是说 ___
A. 刃口圆弧半径很小和前角较大
B. 刀尖很小
【单选题】
C.前角较小和后角较大 D.刃口锋利 13173.数控铣床使用的刀具一般可分为 等形式 ___
A. 组合式、模块式、整体式
B. 镶片式、模块式、组合式
【单选题】
C.焊接式、机夹式、整体式 D.机夹式、组合式、镶片式 13174.加工宽度尺寸大的台阶和沟槽,一般采用 ___
A. 立铣刀
B. 成形铣刀
C. 盘形铣刀
D. 端铣刀
【单选题】
丝锥、锯条、锉刀等低速工具一般采用 制造 ___
A. 低合金刃具钢
B. 高速钢
C. 硬质合金
D. 立方氮化硼
【单选题】
夹紧力作用方向最好指向工件刚度最 的方向 ___
A. 大
B. 远
C. 小
D. 近
【单选题】
三爪卡盘自定心卡盘上安装大 工件时,不宜用正爪装夹 ___
A. 直径
B. 厚度
C. 宽度
D. 长度
【单选题】
对于需要在轴向固定其他零件的工件,可选用 中心孔 ___
A. C 型
B. B 型
C. A 型
D. D 型
【单选题】
压板垫铁的高度要适当,防止压板和工件 不良 ___
A. 接触
B. 位移
C. 移动
D. 精度
【单选题】
定位套常用于小型形状简单的 零件的精基准定位 ___
A. 轴类
B. 轮盘类
C. 箱体类
D. 方块类
【单选题】
选择切削用量的原则时要在机床动力和 允许,又能满足加工表面粗糙度的前提下, 选取尽可能大的进给量 ___
A. 刚度
B. 强度
C. 转速
D. 速度
【单选题】
粗加工余量极不均匀时,可选用两次或数次 ,视具体情况应先切去不均匀部分 ___
A. 进给
B. 加工
C. 切削
D. 装夹
【单选题】
光学平晶等厚干涉法适用于测量精度较高的 ___
A. 小平面
B. 大平面
C. 圆柱面
D. 圆跳动
【单选题】
用干分尺在 于轴线的固定截面的直径方向进行测量 ___
A. 垂直
B. 平行
C. 斜交
D. 交叉
【单选题】
测量圆柱度误差时,被测件放在精确 的 V 形架内 ___
A. 平板
B. 虎钳
C. 平口钳
D. 工作台
【单选题】
检测工件面对面的垂直度误差时将工件放置在 上,精密直角尺的短边置于平板上 ___
A. 平板
B. 虎钳
C. 木板
D. 铜板
【单选题】
同铀度误差可用圆度仪、三坐标测量装置、 ___
A. 指示器
B. 游标卡尺
C. 直角尺
D. 刀口尺
【单选题】
下图为测量某工件圆锥面对φd 外圆轴线的斜向 误差 ___
A. 圆跳动
B. 同轴度
C. 垂直度
D. 平行度
【单选题】
全跳动公差是要使被测工件作无轴向移动的 旋转 ___
A. 连续
B. 单周
C. 双周
D. 半周
【单选题】
政治方面的强制力量,如国家的的权力、人民代表大会的权力、企业法人的权力属于 的范畴 ___
A. 职业权力
B. 职业义务
C. 职业责任
D. 职业纪律
【单选题】
不同职业的具体职业责任是 ___
A. 不同的
B. 相同的
C. 有些是相同的
D. 没有界定
【单选题】
“诚实守信、宽厚待人”的基本内容有 ___
A. 以下都是
B. 讲真话,坚持真理
【单选题】
C.真诚相处,宽厚待人 D.信守承诺,诚实履职 13199.以下论述错误的是 ___
A. 企业的信誉主要来自公关
B. 注重质量才能赢得信誉
C. 确保质量才能求得生存与发展
D. 质量是文明与进步的重要标志
【单选题】
经常发生的危害性很大的突发性电气故障是 ___
A. 短路
B. 漏电
C. 断路
D. 电压降低
【单选题】
环境保护法的基本原则不包括 ___
A. 开发者保护,污染者负责
B. 政府对环境质量负责
【单选题】
C.预防为主,防治结合 D.环保和社会经济协调发展 13202.齿轮泵泵体的磨损一般发生在 一段 ___
A. 吸油腔
B. 吸油口
C. 压油腔
D. 连心线两端
【单选题】
在 windows2000 的“资源管理器”窗口中,其右部窗口中显示的是 ___
A. 当前打开的文件夹的内容
B. 系统的文件夹树
C. 当前打开的文件夹名称及其内容
D. 当前打开的文件夹名称
【单选题】
下图的名称是 ___
A. 欠电流线圈
B. 过电流线圈
【单选题】
C.过电压线圈 D.欠电压线圈 13205.在一次回路中,用标号中的百位数字的顺序来区分 ___
A. 不同供电电源回路
B. 回路相别
C. 元件特征
D. 回路极线
【单选题】
在车床控制电路中,按钮属于电路的 元件 ___
A. 控制元件
B. 导线
C. 电源
D. 负载
【单选题】
数控车床主轴前端的结构图是下图中的图 ___
A. A
B. B
C. C
D. D
【单选题】
定向装配可以以提高主轴的 ___
A. 回转精度
B. 尺寸链精度
C. 开环精度
D. 封闭环精度
【单选题】
通过改变可位移零件的位置使封闭环达到规定的精度的装配法称为 ___
A. 调整法
B. 修配法
C. 选择装配法
D. 全互换法
【单选题】
某导线的内阻为 6 欧,额定电压 220V,额定功率 2.2KW 的电动机接在此导线上,求此导线的压降 ___
A. 0.7V
B. 0.5V
C. 0.3V
D. 2V
推荐试题
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting