【单选题】
在下列关于平面图形几何性质的结论中,错误的是___
A. 图形的对称轴必通过形心
B. 图形两个对称轴的交点必为形心
C. 图形对对称轴的静矩为零
D. 使静矩为零的轴一定是对称轴
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
中性轴是梁的___的交线
A. 纵向对称面与横截面
B. 纵向对称面与中性层
C. 横截面与中性层
D. 横截面与顶面或底面
【单选题】
应用BIM支持和完成装配式工程项目生命周期过程中各种专业任务的专业人员指的是___
A. 装配式BIM标准研究类人员
B. 装配式BIM工具开发类人员
C. 装配式BIM工程应用类人员
D. 装配式BIM教育类人员
【单选题】
下列选项中主要负责组件BIM团队、研究BIM对企业的质量效益和经济效益以及制定BIM实施宏观计划的是___
A. 装配式BIM战略总监
B. 装配式BIM执行经理
C. 装配式BIM技术顾问
D. 装配式BIM操作人员
【单选题】
下列不属于装配式建筑特点的是___。
A. 建设周期短
B. 耐火性好
C. 质量轻、绿色环保
D. 施工精确度不高
【单选题】
新的施工方法可应用于住宅信息传输及接收技术,体现出了装配式的哪一项特点___
A. 节能
B. 抗震
C. 智能化
D. 隔声
【单选题】
下列选项哪一项不属于装配式建筑存在的不足___?
A. 前期一次性成本高
B. 技术水平要求高且高度注重专业协作
C. 需制定相关标准与构造图集
D. 房屋采用新型的供热、制冷技术
【单选题】
为协助管理人员有效决策和精细管理施工现场的进度、成本、质量等信息资料,需要用装配式哪个系列软件___?
A. 装配式BIM机构分析软件
B. 装配式BIM协同平台软件
C. 装配式BIM深化设计软件
D. 装配式BIM建模软件
【单选题】
由预制的大型内外墙板、楼板和屋面板等板材装配而成的建筑属于装配式的哪一类建筑___?
A. 板材建筑
B. 砌块建筑
C. 盒式建筑
D. 骨架板材建筑
【单选题】
下列不属于建筑信息模型(Building Information Modeling) 的特点表述正确的是___
A. 可视化、协调性、模拟性、优化性、可出图形
B. 可视化、协调性、自动性、优化性、联动性
C. 可视化、协调性、模拟性、自动性、可出图形
D. 可视化、协调性、管理性、优化性、可出图形
【单选题】
10在建筑总平面图中建筑物的定位尺寸包括尺寸定位和___定位
A. 坐标网式
B. 原点式
C. 中心式
D. 距离式
【单选题】
11剖面图主要表达建筑物内部的___构造
A. 横行
B. 竖向
C. 水平
D. 网状
【单选题】
下列有关BIM数据文件和数据库多种形式数据交互常用格式无错误的是___
A. IFC、CSV
B. DWG、IFC
C. SAT、PNG
D. EXE、SAT
【单选题】
美国建筑师协会(AIA)定义了建筑信息模型中数据细致程度(LOD)的概念,LOD 被定义为 LOD100、LOD200、LOD300、LOD400、LOD500共五个等级。LOD400所达到的要求是___
A. 整合设计模型
B. 搭建模型
C. 建造加工
D. 维护维修
【单选题】
BIM(Building Information Modeling)的概念是___
A. 以建筑工程项目的各项相关信息数据作为基础,建立起三维的建筑模型。
B. 建筑业数据模型
C. 以建筑工程项目的各项相关信息数据作为基础,建立起三维的建筑模型,通过数字信息仿 真模拟建筑物所具有的真实信息,贯穿建筑物的全生命周期。
D. 建筑信息模型
【单选题】
下列不属于项目中运用BIM技术的价值的是___
A. 精确计划,减少浪费
B. 虚拟施工,有效协同
C. 碰撞检测,减少返工
D. 几何信息添加,信息集成
【单选题】
下列不属于装配式结构类型的是___
A. 装配式框架结构
B. 装配式剪力墙结构
C. 装配式 砌体结构
D. 装配式部分框支剪力墙结构
【单选题】
BIM在投标过程中的应用不包括___
A. 基于BIM的深化设计
B. 基于BIM的施工方案模拟
C. 基于BIM的4D施工模拟
D. 基于BIM的资金优化
【单选题】
BIM应用的一般流程___
A. BIM建模、深化设计、施工模拟、施工方案规划
B. BIM建模、施工模拟、深化设计、施工方案规划
C. BIM建模、施工方案规划、施工模拟、深化设计
D. BIM建模、施工方案规划、深化设计、施工模拟
【单选题】
装配式建筑施工前期甲方(监理)的工作内容为___
A. 施工流水,场地规划,构件安装,构件拆分,构件重量
B. 配合图纸设计,预留预埋,图纸确认,验收策划,施工策划
C. 组织协同,组织协调,责任划分,精装定位,验收
D. 配合图纸设计,预留预埋,图纸确认,生产周期策划,模具设计
【单选题】
2016年起,国家决定大力发展装配式建筑,推动产业结构调整升级,上海政府规定单体预制装配率不低于___。
A. 40%
B. 30%
C. 50%
D. 45%
【单选题】
建筑工业化的核心是___。
A. 标准化的设计
B. 施工装配化
C. 装修一体化和管理信息化
D. 构配件生产工厂化
【单选题】
下列说法正确的是___
A. 装配式高层建筑含精装修可在半年内完成
B. 装配式建筑不能完全解决传统建筑方式普遍存在的“质量通病”
C. 装配式建筑的现场用人少,时间短,综合成本降低
D. 装配式建筑的一大变革是将农民工变成操作工人
【单选题】
在下列选项中,剪力墙结构体系和技术要点匹配正确的是___。
A. 装配整体式剪力墙结构工业化程度很高,一般应用于高层建筑
B. 叠合剪力墙结构一般国外应用较多,施工速度快,一般应用于南方地区
C. 多层装配式剪力墙结构工业化程度一般,施工速度快,应用于多层建筑
D. 将装配整体式剪力墙应用与多层剪力墙结构体系,真正做到工业化生产、施工
【单选题】
预制剪力墙结构体系使用较多的竖向钢筋连接是___,降低了套筒的使用数量,也降低了综合成本。
A. 底部预留后浇区连接
B. 套筒灌浆连接
C. 螺旋箍筋约束浆锚搭接连接
D. 金属波纹管浆锚搭接连接
【单选题】
下列说法正确的是___
A. 装配式高层建筑含精装修可在半年内完成
B. 装配式建筑不能完全解决传统建筑方式普遍存在的“质量通病”
C. 装配式建筑的现场用人少,时间短,综合成本降低
D. 装配式建筑的一大变革是将农民工变成操作工人
【单选题】
在《装配式混凝土结构技术规程》中多层剪力墙结构设计适用于不高于( )层,建筑设防类别为___。
A. 8层,甲类
B. 6层,乙类
C. 7层,甲类 
D. 6层,丙类
【单选题】
预制混凝土剪力墙体系和多层混凝土剪力墙体系的结构设计可以今天参考___地方的标准
A. 北京,上海
B. 北京,广州
C. 上海,安徽
D. 上海,苏州
【单选题】
装配式结合BIM技术在项目的哪一个阶段,进行碰撞检查动能___。
A. 设计阶段
B. 现场施工
C. 构件生产
D. 深化设计
【单选题】
下列哪一项不属于装配式建筑采用BIM技术后,在设计阶段需要前置的工作___。
A. 进行构件拆分
B. 确定好装配式建筑的技术路线
C. 制定装配式技术产业化目标
D. 构件生产加工指导
【单选题】
模拟分析住宅区的热岛效应,采用合理优化建筑单体设计、群体布局和加强绿化等方式消弱热岛效应。综上所述,是在对建筑进行哪一项性能化分析___。
A. 自然采光模拟
B. 环境模拟分析
C. 风环境模拟分析
D. 噪声模拟分析
【单选题】
装配式建筑性能分析是在建筑的哪一个阶段进行操作___
A. 设计阶段
B. 深化设计阶段
C. 出图阶段
D. 构件拆分阶段
【单选题】
对装配式建筑进行性能化分析,其中不包括___
A. 室外风环境模拟
B. 自然采光模拟
C. 车流量分析模拟
D. 自然通风模拟
【单选题】
设计阶段的经计算量分析,实现了对项目哪一项内容的初步控制___。
A. 项目进度
B. 构件种类
C. 构件数量
D. 项目成本
【单选题】
设计阶段的经计算量分析,实现了对项目哪一项内容的初步控制___。
A. 项目进度
B. 构件种类
C. 构件数量
D. 项目成本
【单选题】
在进行深化设计阶段的模型建立时,需要进行多方考虑,其中不包括___。
A. 尊重设计阶段的最初方案和二维施工图的设计意图
B. 注意各专业、施工单位构件厂间协同和沟通
C. 考虑是否满足施工需要
D. 对构件的几何属性进行可视化分析
【单选题】
通过以下哪项技术,可实现预制构件的数字化建造___。
A. ACM
B. CAM
C. BAM
D. ABM
【单选题】
BIM再方案策划阶段的应用内容主要包括现状建模、成本核算、场地分析和___。
A. 深化设计
B. 碰撞检查
C. 总体规划
D. 施工模拟
【单选题】
BIM技术再施工阶段中预制加工管理不包括___。
A. 基于BIM技术对关键工艺进行展示
B. 基于BIM技术实现钢筋准确下料
C. 基于BIM技术可对构件进行详细信息查询
D. 基于BIM技术可出具构件加工详图
【单选题】
BIM在深化设计中的关键应用点不包括___。
A. 模型的协同与沟通
B. 机电碰撞检测
C. 建筑物性能分析
D. 节点图出具
【单选题】
装配式BIM在装修过程中的应用点,不包括___
A. 形成构件族库
B. 模拟安装
C. 划分功能区域
D. 采光模拟分析
推荐试题
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map