【单选题】
导体的电阻不但与导体的长度、截面有关,而且还与导体的___有关。
A. 温度
B. 湿度
C. 距离
D. 材质
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
交流电的三要素是指最大值、频率、___。
A. 相位
B. 角度
C. 初相角
D. 电压
【单选题】
正弦交流电的有效值等核最大值的___。
A. 1/3
B. 1/2
C. 2
D. 0.7
【单选题】
阻值不随外加电压或电流的大小而改变的电阻叫___。
A. 固定电阻
B. 可变电阻
C. 线性电阻
D. 非线性电阻
【单选题】
阻值随外加电压或电流的大小而改变的电阻叫___。
A. 固定电阻
B. 可变电阻
C. 线性电阻
D. 非线性电阻
【单选题】
在三相四线制中,当三相负载不平衡时,三相电压相等,中性线电流___。
A. 等于零
B. 不等于零
C. 增大
D. 减小
【单选题】
串联电路中,电压的分配与电阻成___。
A. 正比
B. 反比
C. 1:1
D. 2:1
【单选题】
并联电路中,电流的分配与电阻成___。
A. 正比
B. 反比
C. 1:1
D. 2:1
【单选题】
线圈中感应电动势的方向可以根据___定律,并应用线圈的右手螺旋定则来判定。
A. 欧姆
B. 基儿霍夫
C. 楞次
D. 戴维南
【单选题】
在纯电感电路中,没有能量消耗,只有能量___。
A. 变化
B. 增强
C. 交换
D. 补充
【单选题】
电压互感器的一次绕组的匝数___二次绕组的匝数。
A. 大于
B. 远大于
C. 小于
D. 远小于
【单选题】
二极管的主要特性就是___。
A. 整流
B. 稳压
C. 单向导通
D. 反向击穿
【单选题】
在整流电路的输出端并一个电容,主要是利用电容的___特性,使脉动电压变得较平稳。
A. 电压不能突变
B. 滤波
C. 充放电
D. 升压
【单选题】
建筑电气安装图一般用___表示。
A. 立面图
B. 平面图
C. 三维立体图
D. 大样图
【单选题】
接线较复杂的图中,导线连接用中断线表示,通常采用___编号法。
A. 相对
B. 绝对
C. 顺序
D. 逻辑
【单选题】
电气图中,凡尺寸单位不用___的必须另外注明。
A. 厘米
B. 毫米
C. 微米
D. 分米
【单选题】
并列运行的变压器其容量之比一般不超过___。
A. 1:1
B. 2:1
C. 3:1
D. 4:1
【单选题】
变压器的铁芯采用相互绝缘的薄硅钢片制造,主要目的是为了降低___。
A. 杂散损耗
B. 铜耗
C. 涡流损耗
D. 磁滞损耗
【单选题】
电力系统中以“kWh”作为___的计量单位
A. 电压
B. 电能
C. 电功率
D. 电位
【单选题】
我国交流电的频率为50Hz,其周期为___秒。
A. 0.01
B. 0.02
C. 0.1
D. 0.2
【单选题】
三相电动势的相序为U-V-W称为___
A. 负序
B. 正序
C. 零序
D. 反序
【单选题】
在变电所三相母线应分别涂以___色,以示正相序
A. 红、黄、绿。
B. 黄、绿、红。
C. 绿、黄、红。
【单选题】
正序的顺序是___
A. U、V、W。
B. V、U、W。
C. U、W、V。
D. W、V、U。
【多选题】
为了实现集团管控一体化,建立统一的结算和费用报账平台,资金结算管理平台都有那几个模块___
A. 资金管理
B. 预算管理
C. 结算管理
D. 项目管理
E. 资产管理
【多选题】
为了强化资金使用的计划性与效率性,帮助集团掌控未来资金收支计划,为资金筹划提供数据支持,资金管理模块都有哪几种计划类型___
A. 周资金计划
B. 月资金计划
C. 季度资金计划
D. 年度资金计划
【多选题】
资金结算管理平台实现的主要作用___
A. 预算资金双重控制(业务发起预算控制,付款资金计划校验)
B. 资金预算全过程管理(资金计划从业务发起到平衡,到付款检查全过程管理)
C. 融资全生命周期管理(实现融资从授信,申请到最后还款的全周期管理)
D. 完整的分析体系(预算、资金和结算多种类型的统计分析)
E. 内部资金往来数据同源(本部与下属单位资金往来业务,一方处理,双方记账)
【多选题】
预算管理模块中预算项目控制模式有哪几种___
A. 绝对控制
B. 建议控制
C. 不控制
D. 刚性控制
【多选题】
下面哪些内容属于结算管理模块的___
A. 费用报销单
B. 对外结算申请(总账)
C. 预算项目分解
D. 资金支付申请单
E. 周资金计划
【多选题】
资金管理中融资模块的业务类型有哪些___
A. 到款
B. 还款
C. 计提利息
D. 付息
E. 收取利息
【多选题】
资金管理模块涉及的主要业务有___
A. 资金计划
B. 资金集中
C. 资金支付申请
D. 融资管理
E. 银行账户管理
【多选题】
用户如何修改自己用户名的密码信息。___
A. :通过首选项进行修改。
B. :点击个人信息属性设置进行修改。
C. :无法修改。
【多选题】
1: 2: 3: 4: ___
A. :1、清空一条记录;2、删除一条记录;3、切换责任;4、查找。
B. :1、删除一条记录;2、清空一条记录;3、切换责任;4、查找。
C. :1、查找;2、清空一条记录;3、切换责任;4、删除一条记录。
D. :1、清空一条记录;2、删除一条记录;3、切换责任;4、显示浏览器。
【多选题】
在ERP系统中,哪个快捷方式可以实现复制上一行数据的功能?___
A. :SHIFT+F6
B. :COPY
C. :F11
D. :CTRL+L
【多选题】
对于来源于业务模块数据的正确处理方法是?___
A. :如果发现数据错误,可直接在总账模块冲销。
B. :如果发现数据错误,可直接在来源于业务模块的日记账中进行修正。
C. :如果发现数据错误,可直接删除来源于业务模块的日记账。
D. :如果发现错误,需返回至业务模块修改,生产新的日记账信息。
【多选题】
项目成本的来源主要有?___
A. :库存模块物资领退料。
B. :采购模块费用(服务)接收或退货。
C. :项目杂项支出。
D. :应付模块项目成本发票结算。
【多选题】
项目预算录入方法有?___
A. :项目层总额
B. :顶层任务总额
C. :顶层或底层任务
D. :顶层或底层任务(含资源)
【多选题】
应付发票匹配方案的三单具体指?___
A. :采购订单
B. :接收单
C. :发票
D. :领料单
【多选题】
ERP系统进行预算检查的环节有?___
A. :需求计划提交审批时
B. :费用类采购订单(分配行关联项目)提交审批时
C. :物资领料申请单提交审批时
D. :采购订单提交审批时
【判断题】
对于已经导入的单据,不能在资金结算平台打印凭证,只能在EBS打印
A. 对
B. 错
【判断题】
上传附件的时候不能多文件上传,只能单个文件上传
A. 对
B. 错
【判断题】
财务人员做付款单据时,结算账户选择中转银行时,不用选择资金计划
A. 对
B. 错
推荐试题
【填空题】
50.精确制导技术是指采用高技术直接命中概率超过___以上的武器。
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption