中药注射剂常用的提取和精制方法有哪些?

题型:问答题 简答题

问题:

中药注射剂常用的提取和精制方法有哪些?

考点:药剂学药剂学题库
题型:问答题 简答题

三甲复脉汤是在加减复脉汤中()

A.去麻仁加牡蛎

B.去麻仁加山甲

C.加龟板、牡蛎、龙骨

D.加牡蛎、龟板、鳖甲

E.加牡蛎、龟板、山甲

题型:问答题 简答题

KY-310型牙轮钻机钻杆的材质为()。

A.35CrMo

B.35CrMn

C.40CrMo

D.ZG35Ⅱ

题型:问答题 简答题

男,62岁,左下肢活动不利3天,CT平扫示:右基底节区见一圆形低密度灶,边界欠清,直径约为0.5cm,脑中线居中。

本病例最可能诊断为()

A.脑出血

B.腔隙性脑梗死

C.星形细胞瘤

D.脑囊虫病

E.脑软化灶

题型:问答题 简答题

随着生活水平提高与交通条件改善,我国居民避寒旅行逐渐增多。根据气象部门划分冷、暖、热的标准,取1月平均气温在10℃~22℃之间的地区为我国居民适宜避寒区。据此并读完成下列小题。

图中适宜避寒区适合我国北方居民旅行观光的是()

A.新加坡城市花园景观

B.巴西高原热带草原景观

C.成都平原的都江堰

D.西双版纳热带风光

题型:问答题 简答题

In the following essay, each blank has four choices. Choose the best answer and write down on the answer sheet.

In security, an (1) is a form of possible loss or harm in a computing system; examples of exposures are unauthorized disclosure of data, modification of data, or (2) of legitimate access to computing. A vulnerability is a weakness in the security system that might be exploited to cause loss or harm. A human who exploits a vulnerability perpetrates an attack on the system. Threats to computing systems are circumstances that have the potential to cause loss or harm; human attacks are examples of threats, as are natural disasters, inadvertent human errors, and internal hardware or software (3) . Finally, a control is a protective measure an action, a device, a procedure, or a technique - that reduces a vulnerability. The major (4) of computing systems are hardware, software, and data. There are four kinds of threats to the security of a computing system: interruption, interception, modification, and (5) . The four threats all exploit vulnerabilities of the assets in computing systems.

2()

A.decline

B.rejection

C.refusal

D.denial

更多题库