搜题
用户您好, 请在下方输入框内搜索其它题目:
搜题
题目内容 (请给出正确答案)
提问人:网友 发布时间:
【单选题】

()are used for anchor gear in marine work where the chains must withstand the corrosive effects of seawater.

A、Chains

B、Wires

C、Ropes

D、Lines

更多“()are used for anchor gear in marine work where the chains must withstand the corrosive effects of seawater.”相关的问题
第1题

A、Lashing bars, twist locks, bridge plates and bridge fittings are tools used for lashing containers.  B、Twist locks, bridge plates, bridge fittings and lashing bars are tools used for lashing containers.  C、Twist locks, lashing bars, bridge fittings and bridge plates are tools used for lashing containers.  D、Lashing bars, bridge fittings, bridge plates and twist locks are tools used for lashing containers.  

点击查看答案
第2题

A、for use  B、to use  C、in use  D、of use  

点击查看答案
第3题

A、Use the transport security mode and specify None for transport client credential type.  B、Use the transportWithMessageCredential security mode and specify Basic for the transport client credential type.  C、Use the message security mode and specify Basic for the transport client credential type.  D、Use the transportWithMessageCredential security mode and specify None for the transport client credential type.  

点击查看答案
第5题

A、A.oxygen and explosion meter when it is used for detection of flare gases  B、B.self-contained breathing apparatus,when used as protection from gas leaking from a refrigeration unit  C、C.boots and gloves that are made of rubber or electrically non-conductive material,if used when repairing electrical equipment  D、D.lifeline,if used by personnel entering a compartment which might be deficient of oxygen  

点击查看答案
第6题

A、The same key is used for encryption and decryption.  B、It is commonly used to create digital certificate signatures.  C、It uses two keys: one for encryption and a different key for decryption.  D、An attacker can decrypt data if the attacker captures the key used for encryption.  

点击查看答案
第7题

A、The same key is used for encryption and decryption.  B、It is commonly used to create digital certificate signatures.  C、It uses two keys: one for encryption and a different key for decryption.  D、An attacker can decrypt data if the attacker captures the key used for encryption.  

点击查看答案
第8题

A、Import policies are used to filter routes from the routing table to the forwarding table.  B、Import policies are used to filter routes destined for the routing table.  C、Import policies are used to filter routes being sent to neighboring devices.  D、Import policies are used to filter traffic entering the device.  

点击查看答案
第9题

A、Export policies are used to filter routes from the RE forwarding table to the PFE forwarding table.  B、Export policies are used to filter routes destined for the routing table.  C、Export policies are used to filter routes being sent to neighboring devices.  D、Export policies are used to filter traffic leaving the device.  

点击查看答案
第10题

A、the other services are run off a reducing station with a pressure gage  B、one of the required pumps is kept available for use on the fire main system at all times  C、no relief valves are installed  D、all of the above conditions are met  

点击查看答案
客服
TOP

请使用微信扫码支付

订单号:
遇到问题请联系在线客服