对机器设备进行裂纹检测,可采用( )。 A.声发射检测法 B.油液光谱分析法 C.

题型:多项选择题

问题:

对机器设备进行裂纹检测,可采用( )。

A.声发射检测法

B.油液光谱分析法

C.油液铁谱分析法

D.射线探测法

E.超声波探测法

考点:注册资产评估师机电设备评估基础机电设备评估基础
题型:多项选择题

有一地下连续墙挖土工程,深度12m,适用的机械是( )。

A.正铲

B.反铲

C.拉铲

D.抓铲

题型:多项选择题

在利用SET协议实现在线支付时,用户通常使用( )。

A.电子现金

B.电子钱包

C.电子信用卡

D.电子支票

题型:多项选择题

阅读材料,回答下列问题:

材料一

古时候洪水泛滥成灾,百姓过着悲惨的生活,A带领人们用疏导的办法治理洪水,他治水13年,三过家门而不入,终于制服了洪水,让老百姓过上了安定的日子。

材料二

B和儿子一起,带领人民化害为利,在岷江流域修建了大型的水利工程,使成都平原成为“天府之国”。
请回答:

材料一和材料二中的两位水利专家A和B分别指的是谁?

题型:多项选择题

Melissa and LoveLetter made use of the trust that exists between friends or colleagues.Imagine receiving an () from a friend who asks you to open it. This is what happens with Melissa and several other similar email () . Upon running, such worms usually proceed to send themselves out to email addresses from the victim’s address book, previous emails, web pages () . As administrators seek to block dangerous email attachments through the recognition of well-known () , virus writers use other extensions to circumvent such protection.Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users. Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the () access to your network.

previous emails, web pages()

A.memory

B.caches

C.ports

D.registers

题型:多项选择题

土地所有权

更多题库