单选题A shepherd’s crook is used to().Alower spring buoys into the waterBfind an anchor after the buoy has been lostCtransfer a pennant wire to the anchor handling boatDclean chain as it is hauled into the rig

单选题
A shepherd’s crook is used to().
A

lower spring buoys into the water

B

find an anchor after the buoy has been lost

C

transfer a pennant wire to the anchor handling boat

D

clean chain as it is hauled into the rig


参考解析

解析: 暂无解析

相关考题:

High in the Swiss Alps many years ago, there lived a lonely shepherd(牧羊人)boy who longed for a friend to share his evenings. One night he saw three old men, each holding a glass.The first old man said:“Drink this liquid and you shall be victorious in battle.”The last old man said:“I offer you the happiness of music-----the horn(号角).”The boy chose the third glass.So goes the century, the horn was used by herdsmen to call cattle, for its deep tones echoed across the mountainsides. Even today, on a quiet summer evening, its music can be heard floating among the peaks.6.The passage tells us his lonely job about the shepherd boy.A.TB.F7.The boy choose to drink the glass offered by the last old man because the boy was thirsty.A.TB.F8.After the shepherd boy found the horn, he discovered it was like a new-found friend.A.TB.F9.Today the horn is heard in the Swiss Alps when it rains.A.TB.F10.The Legend of the Horn would be the best title for the passage.A.TB.F

In John Whitehead's opinion, which statement is true?A.Face recognition technology may interfere with people's privacy.B.Face recognition technology may enhance the country's constant surveillance.C.Face recognition technology can be used in the same way wiretaps are used.D.Face recognition technology can be used after its threat has been removed.

The author used to think of her mother's English as____________.A.impoliteB.amusingC.imperfectD.practical

The surname MacDonald in Scotland was probably first used to name Donald's_____. A、uncleB、sonC、nephewD、daughter

In international trade, a banker’s letter of credit is not used for the payment of purchase price.()

publicclassTest{publicenumDogs{collie,harrier,shepherd};publicstaticvoidmain(String[]args){DogsmyDog=Dogs.shepherd;switch(myDog){casecollie:System.out.print(”collie);casedefault:System.out.print(”retriever);caseharrier:System.out.print(”harrier);}}}Whatistheresult?()A.harrierB.shepherdC.retrieverD.Compilationfails.E.retrieverharrierF.Anexceptionisthrownatruntime.

Exposure to asbestos fibres is harmful to people' s health ______.A) so the use of asbestos is limitedB)but asbestos will continue to be used for a long time to comeC) so other new kinds of materials are under developmentD) but they will not be so when ventilation devices are used

“Well done,Cassandra.”Crook said.She blushed,but accepted the ( )with good grace.A.commenceB.compromiseC.compensateD.compliment

The enable secret password appears as an MD5 hash in a router’s configuration file, whereas the enablepassword is not hashed (or encrypted, if the password-encryption service is not enabled). What is thereason that Cisco still support the use of both enable secret and enable passwords in a router’sconfiguration?()A、The enable password is present for backward compatibility.B、Because the enable secret password is a hash, it cannot be decrypted. Therefore, the enable password is used to match the password that was entered, and the enable secret is used to verify that the enablepassword has not been modified since the hash was generated.C、The enable password is considered to be a router’s public key, whereas the enable secret password is considered to be a router’s private key.D、The enable password is used for IKE Phase I, whereas the enable secret password is used for IKE Phase II.

public class Test {  public enum Dogs {collie, harrier, shepherd};  public static void main(String [] args) {  Dogs myDog = Dogs.shepherd;  switch (myDog) {  case collie:  System.out.print(”collie “);  case default:  System.out.print(”retriever “); case harrier:  System.out.print(”harrier “);  }  }  }  What is the result?() A、 harrierB、 shepherdC、 retrieverD、 Compilation fails.E、 retriever harrierF、 An exception is thrown at runtime.

What is the function of the AJB bits on DS1 using Extended Super Frame (ESF)?()A、It is used for signaling on-hook and off-hook statusB、It carries CRC information for error detectionC、It is used for a control and performance informationD、It is used for a frame’s synchronization and alignment

Which of the following commands would be used to display hidden files?()A、dir /?B、dir /dC、dir /aD、dir /s

单选题AIt’s another possible use for seawater.BIt’s necessary for growing vegetables in hot climates.CIt’s used for producing electricity in U.S.DIt makes people comfortable in hot days.

多选题Pseudonyms are used for a variety of reasons, mostly ______; for example, to deny, an actor’s ethnicity, to conceal an author’s gender, or to hide a revolutionary’s true identity.AcovertBexplicitCclandestineDcounterfeitEsurrealFmigratory

单选题The knot at the end of the heaving line used to pass the towing hawser is called a().Amonkey's fistBball or baseball knotCheaving knotDthree strand Turk's head

单选题Which is normally used to hold wire rope for splicing().ACome alongBJiggerCRigger's screwDSealing clamp

单选题The required fireman’s outfits required for ship’s are not to be used for any other purpose EXCEPT for the().Aoxygen and explosion meter when it is used for detection of flare gasesBself-contained breathing apparatus,when used as protection from gas leaking from a refrigeration unitCboots and gloves that are made of rubber or electrically non-conductive material,if used when repairing electrical equipmentDlifeline,if used by personnel entering a compartment which might be deficient of oxygen

单选题A storage specialist is assessing a customer’s tape backup environment. Which of the following questions would be the most appropriate question to identify the customer’s environment?()AHas there been any recent loss of data?BHow many tape drives are in the Library?CWhat tape technology is currently being used?DWhat software is being used for restoring the data?

单选题A test in industrial psychology is used to find out _____.Aa worker's achievementsBa worker's potential for a certain jobCa worker's psychological problemDa worker's motivation for a certain job

单选题A mooring system that results in a spread system without anchor buoys is called a().Apermanent chasing systemBwire rope mooring systemCshepherd's crook mooring systemDspring buoy mooring system

单选题What is the function of the AJB bits on DS1 using Extended Super Frame (ESF)?()AIt is used for signaling on-hook and off-hook statusBIt carries CRC information for error detectionCIt is used for a control and performance informationDIt is used for a frame’s synchronization and alignment

单选题Litmus paste is used in order to determine().AinnageBthievageCullageDthe tank's datum point

单选题A distress signal().Aconsists of 5 or more short blasts of the fog signal apparatusBconsists of the raising and lowering of a large white flagCmay be used separately or with other distress signalsDis used to indicate doubt about another vessel's intentions

单选题It is worthwhile to study the various ways in which Shakespeare used English because _____.AEnglish words have changed a lot since Shakespeare’s timeBby doing so one can be fully aware of the richness of the English languageCEnglish words are now being used in the same way as in Shakespeare’s daysDof none of the above

单选题The Plimsoll mark on a vessel is used to().Aalign the vessel's tailshaftBdetermine the vessel's trimCdetermine the vessel's freeboardDlocate the vessel's centerline

单选题According to the passage, a “pacing” device ______.Ais used to time a student’s reading speedBis not used in most speed reading coursesCis used as an aid to vocabulary learningDshould be used whenever we read alone

单选题()provides a selection of commonly used routes with their distances between principal and important positions.AThe Mariner‟s HandbookBAdmiralty Sailing DirectionsCOcean Passages for the WorldDMariner‟s Routeing Guide