网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
The success of an indirect attack on a fire depends on the().
A
size of the fire when initially observed
B
complete containment of the fire
C
cooling ability of the firefighting agent
D
class of the fire
参考答案
参考解析
解析:
暂无解析
更多 “单选题The success of an indirect attack on a fire depends on the().A size of the fire when initially observedB complete containment of the fireC cooling ability of the firefighting agentD class of the fire” 相关考题
考题
So sudden ________ that the enemy had no time to escape.A. did the attack B. the attack did C. was the attack D. the attack was
考题
Which is not mentioned as the author’s feeling about the work of the volunteers?A、unimportant to the success of the OlympicsB、unnecessary to the success of the OlympicsC、irrelevant to the success of the OlympicsD、invaluable to the success of the Olympics
考题
In all projects,needs must be tempered by schedule,cost and resource constraints.Project success depends primarily on (74)A.the quality of the schedule and cost control analysisB.customer satisfactionC.customer compromise in defining its needsD.exceeding customer requirements through gold-plating
考题
Project success depends primarily on() 。A.The quality of the schedule and cost control analysis
B.Customer satisfaction
C.Customer compromise in defining its needs
D.Exceeding customer requirements through gold-plating
考题
There are two general approaches to attacking a ( )encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the ( ) or even some sample plaintext- ciphertext pairs. This type of ( ) exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised. The second method, known as the ( 4 )-force attack, is to try every possible key on a piece of ( ) until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.
(4)处应选_______.
A. brute
B. perfect
C. atribue
D. research
考题
There are two general approaches to attacking a ( )encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the ( ) or even some sample plaintext-ciphertext pairs. This type of (请作答此空 ) exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised. The second method, known as the ( )-force attack, is to try every possible key on a piece of ( ) until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.
A. message
B. knowledge
C. algorithm
D. attack
考题
There are two general approaches to attacking a (1)encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the ( ) or even some sample plaintext- ciphertext pairs. This type of ( ) exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised. The second method, known as the ( )-force attack, is to try every possible key on a piece of ( ) until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.
(1)处应选________.
A. stream
B.symmetric
C. asymmetric
D.advanced
考题
在语音通信交换系统中有IA码的概念,IA的全称是()。A、Information ArchitectsB、Internet AccessC、Indirect AccessD、Indirect Answer
考题
单选题Which firefighting method is an example of an indirect attack on a fire?().A
Bouncing a straight stream of water off the overhead to create spray effectB
Spraying foam on a bulkhead and letting it flow down and over a pool of burning oilC
Flooding a paint locker with CO2 and sealing the compartmentD
Cooling adjacent bulkheads with water to prevent the spread of the fire by conduction
考题
单选题What is an advantage of using foam in fire fighting?()A
It is MOST effective on very hot oil fires where the temperatures of the liquid exceed 100°C (212°F)B
Most foams can be used with dry chemicals to attack a fire by two methodsC
Foam is effective on combustible metal firesD
Foam can be made with seawater or fresh water
考题
单选题What is an advantage of using foam in fire fighting?()A
It is effective in controlling fire in flowing oil such as coming from a broken fuel lineB
It absorbs heat from materials that could cause reignitionC
Most foams can be used jointly with dry chemical extinguishing agents to attack a fire by two methods of extinguishmentD
Once the surface is blanketed with foam and the fire is extinguished,no further foam is required
考题
单选题A fire must be ventilated().A
when using an indirect attack on the fire such as flooding with waterB
to prevent the gases of combustion from surrounding the firefightersC
to minimize heat buildup in adjacent compartmentsD
if compressed gas cylinders are stowed in the compartment on fire
考题
单选题When two fire hose teams are attacking a fire they should().A
use different fire hose pressuresB
use fire hoses of different sizesC
not attack the fire from opposite sidesD
not wear protective clothing
考题
单选题An example of class "A" fire is a/an ().A
electrical fire in the engine roomB
oil fire in the engine room bilgesC
oil fire involving a grade A petroleum productD
mattress fire in a stateroom
考题
单选题An indirect radar echo is caused by a reflection of the main lobe of the radar beam off the observer’s vessel. Which of the following is NOT a characteristic of indirect echoes?().A
Their bearing is almost constant,even when the true bearing of the contact changes appreciablyB
They always appear on a bearing of 90°from the true bearing of the contactC
The indirect echoes usually appear in shadow sectorsD
When plotted,their movements are usually abnormal
考题
单选题The success of a training program depends on _____.A
the places where the training takes placeB
the correct evaluation of the costs and savings of the programC
the performance of the workers and technicians trained in the programD
the training methods and the quality of the training staff
热门标签
最新试卷