【单选题】
全电路欧姆定律的数学式为___。
A. I=U/R;
B. I=E/(R-r) ;
C. I=U/(R+r) ;
D. I=E/(R+r) ;
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
在全电路中,负载电阻增大,端电压将___。
A. 增大;
B. 减小;
C. 不变;
D. 为零;
【单选题】
欧姆定律是表示电压.电流和___三者关系的基本定律。
A. 电阻;
B. 电动势;
C. 功率;
D. 电能;
【单选题】
已知电压有效值和用电时间,计算电阻消耗的电能的公式为___。
A. W=UIt;
B. W=I2Rt;
C. W=Pt;
D. W=(U2/R)t;
【单选题】
负载功率是指电能转变为其他形式的能量的速率,即___。
A. P=EIt/t=El;
B. P=UIt/c=UI=I2R=U2/R;
C. P=UI/2;
D. P=A/t;
【单选题】
电功的大小与电路中的电流.电压及___成正比。
A. 电阻;
B. 通电时间;
C. 电势;
D. 能量;
【单选题】
电流热效应的产生是因为导体中存在___。
A. 电抗;
B. 电阻;
C. 电容;
D. 感抗;
【单选题】
由电引起的火灾是由于电流的___效应造成的。
A. 物理;
B. 磁;
C. 热;
D. 涡流;
【单选题】
焦耳定律是定量说明传导电流时将___转换为热能的定律。
A. 磁能;
B. 电能;
C. 势能;
D. 动能;
【单选题】
在电阻并联电路中,各支路分配的电流与支路的电阻值成___关系。
A. 反比;
B. 正比;
C. 三次方;
D. 二次方;
【单选题】
混联电路计算的关键是能否求出___。
A. 电阻;
B. 等效电阻;
C. 等值电阻;
D. 串联电阻;
【单选题】
将几个电阻串联起来可使总电阻值___,在电源电压不变时可使电流( )。
A. 增大;减小;
B. 减小;增大;
C. 相等;减小;
D. 减小;相等;
【单选题】
以支路电流为未知量,依据基尔霍夫定律列方程求解各支路电流的方法___。
A. 节点电压法;
B. 叠加原理;
C. 支路电流法;
D. 戴维南定理;
【单选题】
在基尔霍大电路定律中,当电路中各电动势及电阻给定时,电流方向___。
A. 是固定的;
B. 可以任意指定;
C. 为电流流出的方向;
D. 无法判断;
【单选题】
电流源输出电流的一端与电压源的___相对应。
A. 负极;
B. 正极;
C. 电极;
D. iE负极;
【单选题】
电压源与电流源的等效变换是对___而言。
A. 外电路;
B. 内电路;
C. 电路;
D. 电阻;
【单选题】
稳压源就是理想电压源,它们的输出电压不变,但是输出功率会因为___不同而不同。
A. 电流;
B. 负载;
C. 串联电路;
D. 并联电路;
【单选题】
从星形和三角形的等值条件可知,要使两电路的任意两端点间的电压相等,流经对应点的电流相等,必须使两电路任意两端点间的___相等。
A. 电容;
B. 电感;
C. 电阻;
D. 电压;
【单选题】
星形连接和三角形连接的互换,必须按照任意两对应端间的___等值条件进行。
A. 电流大小相等,方向相反;
B. 电压大小相等,方向相同;
C. 电流大小相等,方向相同;
D. 电压大小相等,方向相反;
【单选题】
星形和三角形电路的互换是为了使某些特定形式的复杂电路通过___,简化其复杂的分析计算过程。
A. 网络变形;
B. 相互转换;
C. 等值变换;
D. 等效变换;
【单选题】
电路中任一回路的___的代数和等于各个电阻上电压降的代数和。
A. 电动力;
B. 电压;
C. 端电压;
D. 电动势;
【单选题】
回路电流指的是___。
A. 某回路中流动的电流;
B. 某网孔中流动的电流;
C. 回路的独立支路中流过的电流;
D. 回路中的电源电流;
【单选题】
回路电流法适用于___。
A. 网孑L电路;
B. 平面电路;
C. 非平面电路;
D. 平面电路和非平面电路;
【单选题】
对于支路数较多而只有___节点的电路来说,采用节点电位法,可以不必解联立方程式,使计算步骤简化。
A. 1个;
B. 2个;
C. 3个;
D. 多个;
【单选题】
用节点电位法求解电路时,应首先列出个数___的独立方程。
A. 比节点数少一个;
B. 与回路数相等;
C. 与节点数相等;
D. 比节点数多一个;
【单选题】
任选一个节点,设其电位为零,其余每个节点与此节点之间的___就是该节点的节点电位。
A. 电势;
B. 电压;
C. 电流;
D. 电位;
【单选题】
根据磁感应线方向的规定可以知道,小磁针北极在某点所受的磁力方向与该点的磁感应线方向___。
A. 平行;
B. 垂直;
C. 相同;
D. 相反;
【单选题】
磁感应强度B与垂直于磁场方向的面积S的乘积,称为___。
A. 磁场;
B. 磁势;
C. 磁通;
D. 磁路;
【单选题】
在表示正弦交流电的解析式i=Imsin(t+)中,表示___。
A. 频率;
B. 相位;
C. 初相角;
D. 相位差;
【单选题】
u=U。sin(~f+尹)是正弦交流电压瞬时值的表达式,其中U,表示___。
A. 最大值;
B. 有效值;
C. 频率;
D. 初相角;
【单选题】
某交流电压u=380sin(314t+/2)V,此交流电压的有效值为___。
A. 380/V;
B. 380/V;
C. 380V;
D. 220V;
【单选题】
三相电源绕组末端短接在一起的接法为___。
A. 三角形连接;
B. 星形连接;
C. 短接;
D. 对称连接;
【单选题】
以支路电流为未知量,依据基尔霍夫定律列方程求解各支路电流的方法___。
A. 节点电压法;
B. 叠加原理;
C. 支路电流法;
D. 戴维南定理;
【单选题】
在基尔霍大电路定律中,当电路中各电动势及电阻给定时,电流方向___。
A. 是固定的;
B. 可以任意指定;
C. 为电流流出的方向;
D. 无法判断;
【单选题】
电流源输出电流的一端与电压源的___相对应。
A. 负极;
B. 正极;
C. 电极;
D. iE负极;
【单选题】
电压源与电流源的等效变换是对___而言。
A. 外电路;
B. 内电路;
C. 电路;
D. 电阻;
【单选题】
稳压源就是理想电压源,它们的输出电压不变,但是输出功率会因为___不同而不同。
A. 电流;
B. 负载;
C. 串联电路;
D. 并联电路;
【单选题】
从星形和三角形的等值条件可知,要使两电路的任意两端点间的电压相等,流经对应点的电流相等,必须使两电路任意两端点间的___相等。
A. 电容;
B. 电感;
C. 电阻;
D. 电压;
【单选题】
星形连接和三角形连接的互换,必须按照任意两对应端间的___等值条件进行。
A. 电流大小相等,方向相反;
B. 电压大小相等,方向相同;
C. 电流大小相等,方向相同;
D. 电压大小相等,方向相反;
【单选题】
星形和三角形电路的互换是为了使某些特定形式的复杂电路通过___,简化其复杂的分析计算过程。
A. 网络变形;
B. 相互转换;
C. 等值变换;
D. 等效变换;
【单选题】
电路中任一回路的___的代数和等于各个电阻上电压降的代数和。
A. 电动力;
B. 电压;
C. 端电压;
D. 电动势;
推荐试题
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack