单选题肝蒂的组成包括( )。A门静脉、肝总管、胆总管、淋巴管、淋巴结和神经B门静脉、肝动脉、胆总管、淋巴管、淋巴结和神经C门静脉、肝动脉、胆总管、肝总管、淋巴管和神经D门静脉、肝静脉、胆总管、淋巴管、韧带和神经E门静脉、肝动脉、胆总管、淋巴管、毛细血管网和神经
单选题
肝蒂的组成包括( )。
A
门静脉、肝总管、胆总管、淋巴管、淋巴结和神经
B
门静脉、肝动脉、胆总管、淋巴管、淋巴结和神经
C
门静脉、肝动脉、胆总管、肝总管、淋巴管和神经
D
门静脉、肝静脉、胆总管、淋巴管、韧带和神经
E
门静脉、肝动脉、胆总管、淋巴管、毛细血管网和神经
参考解析
解析:
肝蒂是肝十二指肠韧带的上端、肝胃韧带及其所含出入肝门的结构,其中包含门静脉、肝动脉、胆总管及肝脏自主神经和淋巴结、淋巴管。
肝蒂是肝十二指肠韧带的上端、肝胃韧带及其所含出入肝门的结构,其中包含门静脉、肝动脉、胆总管及肝脏自主神经和淋巴结、淋巴管。
相关考题:
单选题BlingbyAlex.com was known several years ago by the name AlexBling.com.At times, the sales staff still receives orders from clients at the AlexBling.com address.Both names are owned by the company.After you successfully deploy an Exchange 2010 server configuration, which includes two Hub Transport servers, the sales staff informs you that they are no longer able to receive mail at the AlexBling.com address.What should you do so that they can receive email from both domains?()AOn the Hub Transport server, use the New Accepted Domain Wizard to add AlexBling.com.BOn the Mailbox server, use the New Accepted Domain Wizard to add AlexBling.com.CUse Active Directory to add an email alias to each user’s account for AlexBling.com.DOn the Client Access server, use the New Accepted Domain Wizard to add AlexBling.com.
单选题You have a file server that runs Windows Server 2008 R2.You configure quotas on the server.You need to view each users quota usage on a per folder basis.What should you do?()AFrom File Server Resource Manager, create a File Screen.BFrom File Server Resource Manager, create a Storage Management report.CFrom the command prompt, run dirquota.exe quota list.DFrom the properties of each volume, review the Quota Entries list.
多选题Your company has a single active directory domain. All servers run windows server 2008. The company network has servers that perform as web servers. All confidential files are located on a server named FSS1. The company security policy states that all confidential data must be transmitted in the most secure manner. When you monitor the network you notice that the confidential files stored on FSS1 server are being transmitted over the network without encryption. You need to ensure that encryption is always used when the confidential files on the FSS1 server are transmitted over the network. What are two possible ways to achieve this goal? ()ADeactivate all LM and NTLM authentication methods on FSS1 server.BUse IIS to publish the confidential files, activate SSL on the IIS server, and then open the files as a web folder.CUse IPsec encryption between the FSS1 server and the computers of the users who need to access the confidential files.DUse the server message block (SMB) signing between the FSS1 serve and the computers of the users who want to access the confidential files.EActivate offline files for the confidential files that are stored on the FSS1 server. In the folder advanced properties box, select the encrypt contents to secure data option.
单选题Your network consists of an Active Directory forest that contains one domain named contoso.com. All domain controllers run Windows Server 2008 R2 and are configured as DNS servers. You have two Active Directory-integrated zones: contoso.com and nwtraders.com. You need to ensure a user is able to modify records in the contoso.com zone. You must prevent the user from modifying the SOA record in the nwtraders.com zone. What should you do()AFrom the DNS Manager console, modify the permissions of the contoso.com zone.BFrom the DNS Manager console, modify the permissions of the nwtraders.com zone.CFrom the Active Directory Users and Computers console, run the Delegation of Control Wizard.DFrom the Active Directory Users and Computers console, modify the permissions of the Domain Controllers organiz
单选题You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services, configuring name resolution and network access and so on. You are in charge of a domain controller that runs windows server 2008 and the DNS server role. The dns server hosts an active directory-integrated zone for your domain. You need to provide a user with the ability to manage records in the zone. But the user must not so what action should you perform?()AThe user permissions on the zone should be granted.BThe user permissions on the DNS zone should be granted.CThe user should be added to the DNSUpdateProxy Global security group.DThe user should be added to the DNSAdmins domain local security group.
单选题有关安全期避孕法的描述,不正确的是()A在排卵前后4~5天内是易孕期,其他时间为安全期B避开排卵前后2~3天,其他时间有性生活是安全的C使用安全期避孕法者应首先确定排卵日期D安全期避孕法并不十分可靠E月经不规则的妇女不宜选用安全期避孕法
单选题Your environment includes multiple Windows Server 2008 R2 Hyper-V servers. You are designing an administrative strategy for virtual machines (VMs). You need to ensure that members of the Security Compliance Active Directory Domain Services (AD DS) security group can monitor failed logon events on the VMs. What should you do?()AAdd the Security Compliance group to the local administrators group of each VMBAdd the Security Compliance group to the local administrators group of each Hyper-V serverCIn the InitialStore.xml file of each VM, define an access policy for the Security Compliance groupDin the InitialStore.xml file of each Hyper-V server, define an access policy for the Security Compliance group
单选题You have an Exchange Server 2010 Mailbox server.You need to identify which users have the largest mailboxes on the server.What should you do?()ARun the Get-MailBoxStatistics cmdlet.BRun the Get-StoreUsageStatistics cmdlet.CAdd the MSExchangeIS Client performance counters to the Performance Monitor.DAdd the MSExchangeIS Mailbox performance counters to the Performance Monitor.
单选题Your network environment includes the following elements: Two Windows Server 2008 R2 Hyper-V serversTwo VMware ESX 3.5 serversMicrosoft System Center Virtual Machine Manager (VMM) 2008 R2 You run several Windows Server 2003 virtual machines (VMs) on your ESX host servers. You need to convert the ESX VMs to Hyper-V, and you must minimize the downtime during the conversion. What should you do?()ARun the New-V2V PowerShell cmdletBPerform a physical-to-virtual (P2V) conversion while the VMs are runningCShut down the VMs, and then perform a virtual-to-virtual (V2V) conversionDShut down the VMs, and then perform a physical-to-virtual (P2V) conversion
单选题肠梗阻的典型临床表现为()A腹痛、腹胀、呕血、黑便、肠鸣音亢进B腹痛、腹胀、呕吐、停止肛门排便排气C腹痛、腹胀、呕吐、胃型、肠鸣音亢进D腹痛、腹胀、腹泻、低热、肠鸣音消失E腹痛、腹胀、食欲减退、体重下降、腹内包块
单选题You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .The Xxx network has a mail server named XXX-EX01.What actions must you take to do an unattended installation of Exchange Server 2010 server on XXXEX01?()AYou should add recipient filter.BYou should add create Send connectors.CYou should run setup /ps.DYou should add setup.com in the script.
单选题小儿肥胖的标准为()A体重高于同年龄、同身高正常小儿标准的10%B体重高于同年龄、同身高正常小儿标准的15%C体重高于同年龄、同身高正常小儿标准的20%D体重高于同年龄、同身高正常小儿标准的30%E体重高于同年龄、同身高正常小儿标准的50%