【多选题】
矿井主要提升装置必须具备下列资料___,妥善保存。
A. 绞车说明书#
B. 电气系统图#
C. 绞车总装配图#
D. 制动装置结构图
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
ABCD
解析
暂无解析
相关试题
【多选题】
新钢丝绳悬挂使用前,必须对每根钢丝绳做___试验。
A. 拉断#
B. 弯曲#
C. 破坏#
D. 扭转
【多选题】
下列哪些地点必须设置风速传感器。___
A. 突出煤层采煤工作面回风巷#
B. 采区回风巷#
C. 一翼回风巷#
D. 掘进工作面进风流
【多选题】
交变电是___的总称。
A. 交变电动势#
B. 交变电功率#
C. 交变电压#
D. 交变电流
【多选题】
稳压二极管的主要参数有___。
A. 稳定电压#
B. 工作电流#
C. 额定电压#
D. 工作电压
【多选题】
影响载体催化元件灵敏度的主要因素有___。
A. 催化剂衰老#
B. 催化层形态构造变化#
C. 载体表面积减小#
D. 催化剂中毒
【多选题】
三极管有___三种状态。
A. 截止#
B. 放大#
C. 缩小#
D. 饱和
【多选题】
三极管有___两个作用。
A. 放大#
B. 开关#
C. 截止#
D. 饱和
【多选题】
矿用信息传输接口的技术指标应包括___。
A. 至分站之间最大传输距离不小于10km
B. 接口所能接入分站的数量宜在8、16、32、64、128中选取#
C. 将模拟量信号转换为数字量信号进行传输#
D. 独立设备的接口至主机之间最大传输距离不小于5m
【多选题】
矿用信号转换器的技术指标应包括___。
A. 模拟量频率型信号的频率范围:200~1000Hz#
B. 模拟量信号转换处理误差应不大于5%#
C. 模拟量电流型信号范围:100~500mA#
D. 信号转换时间应不大于2s
【多选题】
双通道斩波式直流放大器由___组成。
A. 斩波通道#
B. 低频通道#
C. 高频通道#
D. 主放大器
【多选题】
7805三端稳压集成电路将电源稳定在5V,用来给___供电。
A. 单片机#
B. V/F转换#
C. 检测元件#
D. 声光报警器
【多选题】
34063芯片组成的开关电源用来给___供电。
A. 单片机#
B. 信号输出#
C. 检测元件#
D. 数据显示
【多选题】
数字频带传输系统由___组成。
A. 信道信号形成器#
B. 信道#
C. 接收滤波器#
D. 抽样判决电路
【多选题】
传输线的直流电阻R由R0和R-组成,直流电阻R0的大小与___成正比。
A. 电阻率#
B. 导线截面#
C. 频率#
D. 温度
【多选题】
矿用电话和信号电缆的电感在___时,传输线的电感一般不大于( )。
A. 800Hz#
B. 600Hz#
C. 0.8mH/km#
D. 1.0mH/km
【多选题】
一阶RC电路的时间常数τ=RC,其取值决定于电路的___。
A. 电感#
B. 结构#
C. 电源#
D. 电路参数
【多选题】
无源二端理想电路元件包括___。
A. 二极管#
B. 三极管#
C. 电阻#
D. 电容
【多选题】
关于集成运算放大器,下列说法正确的是___。
A. 集成运放是一种高电压放大倍数的直接耦合放大器#
B. 集成运放是一种高电流放大倍数的直接耦合放大器#
C. 集成运放只能放大直流信号#
D. 希望集成运放的输入电阻大,输出电阻小
E.
【多选题】
集成运放由___几个部分组成。
A. 输入级#
B. 中间级#
C. 转换级#
D. 偏置电路
【多选题】
直接耦合放大电路存在零点漂移的原因是___。
A. 电阻阻值有误差#
B. 晶体管参数的分散性#
C. 晶体管参数受温度影响#
D. 晶体管参数受电容影响
【多选题】
数字传输相比模拟传输,具有以下几项优点。___
A. 抗干扰能力强#
B. 传输中的差错可以设法控制,改善传输质量高#
C. 便于用计算机管理#
D. 占据更宽的传输频带
【多选题】
便携式甲烷报警仪主要由___显式电路、数字比较电路、报警电路、欠压提示电路及关机电路。
A. 开关电路#
B. 稳压电路#
C. 测量电路#
D. 测压电路
【多选题】
标准物质包括___物质。
A. 化学成份分析标准物质#
B. 物理特性与物理化学特性测量标准物质#
C. 工程技术特性测量物质#
D. 测量物质
【多选题】
OM—90两用仪有___特点。
A. 可连续测量甲烷和氧气#
B. 亮度好,清晰度好#
C. 两种浓度任意选择#
D. 精度高
【多选题】
镉镍电池有___特点。
A. 允许大电流放电#
B. 内阻很小#
C. 采用完全密封装量#
D. 体积小
【多选题】
便携式瓦斯报警仪故障查找方法有___。
A. 先简后繁#
B. 先外后内#
C. 先远后近#
D. 先大后小
【多选题】
便携式甲烷报警仪传感元件放在隔爆冶金罩内的原因有___。
A. 隔爆#
B. 限制扩散气流#
C. 保证传感器的安全性能#
D. 消音
【多选题】
惠斯顿电桥的测量臂由___和( )组成。
A. 黑元件#
B. 白元件#
C. 催化元件#
D. 载体元件
【多选题】
报警电路一般由___组成。
A. 振荡器#
B. 电阻#
C. 喇叭#
D. 发光二极管
【多选题】
A/D转换与译码驱动电路的作用有___。
A. 将反映瓦斯浓度的电压值转换成数字量#
B. 通过汉码驱动电路驱动显示电路工作#
C. 测量电路工作#
D. 模拟电路工作
【多选题】
便携式甲烷报警仪与光干涉原理检定器比较优点有___。
A. 体积小#
B. 重量轻#
C. 显示直观#
D. 能报警
【多选题】
便携式甲烷报警仪与光干涉原理检定器比较缺点有___。
A. 元件寿命短#
B. 测量范围小#
C. 不易维修#
D. 用电大
【多选题】
准确度是指___。
A. 反映计量结果与真值大小的平均程度#
B. 反映计量结果与真值之差大小的程度#
C. 反映计量结果与假值大小的平均程度#
D. 反映计量结果与假值之差大小的程度
【多选题】
突出矿井的下列地点必须设置全量程或者高低浓度甲烷传感器。___
A. 采煤工作面进风巷#
B. 煤巷掘进工作面回风流#
C. 采区回风巷#
D. 总回风巷
【多选题】
《山西省人民政府安全生产委员会关于印发进一步加强煤矿瓦斯防治的八项规定的通知》规定:通风设施质量可靠,所有盲巷及连通已采区的密闭前(扩散通风范围内)不得设置___,特殊情况需设置的,必须制定措施,经矿总工程师批准。
A. 电气设备#
B. 盲巷#
C. 开关#
D. 电缆
【多选题】
一阶电路全响应的三要素是指待求响应的___。
A. 最大值#
B. 平均值#
C. 初始值#
D. 稳态值
【多选题】
井下风速不同巷道最高允许风速可能为___m/s。
A. 4#
B. 6#
C. 8#
D. 16
【多选题】
硅二极管的特点有___。 "
A. PN结结面大#
B. 可通过的电流大#
C. 工作频率高#
D. 可用于高频检波"
【多选题】
___每条联络巷中,必须砌筑永久性风墙。
A. 进、回风井之间#
B. 主要进、回风巷之间#
C. 主要硐室之间#
D. 采掘工作面之间
【多选题】
___等堆放场距离进风口不得小于80m。
A. 木材料#
B. 矸石山#
C. 炉灰堆#
D. 煤堆
推荐试题
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC