单选题Which of the following methods is normally used to control the temperature of air distributed from individual cooling coils in an air conditioning system using a chilled water circulation system?()AA room thermostat activates an electric heater at each individual chilled air outlet when necessaryBVarying the number of passes the air makes across the coilsCVarying the temperature of the water through the coilsDVarying the quantity of water flowing through the coils
单选题
Which of the following methods is normally used to control the temperature of air distributed from individual cooling coils in an air conditioning system using a chilled water circulation system?()
A
A room thermostat activates an electric heater at each individual chilled air outlet when necessary
B
Varying the number of passes the air makes across the coils
C
Varying the temperature of the water through the coils
D
Varying the quantity of water flowing through the coils
参考解析
解析:
暂无解析
相关考题:
For every situation, several methods usually exist for effective communication to take place. Which of the following is least likely to be used for explaining to the team project planning guidelines?A project office memoB project office directiveC project team meetingD formal reportE counseling sessions
Which of the following methods is used to increase the number of processes sharing the CPU?A.InterruptB.SchedulerC.SwappingD.Working Set
You need to describe the various types of flow control to your co-workers. Which of the following are types of flow control that can be used in a network? (Choose three)A. Congestion avoidanceB. WindowingC. Cut-throughD. BufferingE. Load BalacingF. Fast Forward
Which of the following connector types is used with twisted pair cable?()A、T-ConnectorB、BNCC、RJ-45D、LC
A site administrator is configuring Resource-level access control. Which of the following statements about Resource-level access control are true? Resource-level access control policies:()A、are optionalB、are used to protect data beansC、provide coarse-grained access controlD、never specify a relationship
Which of the following utilities can be used to determine the current partition information on an attached storage device?()A、Add Hardware WizardB、Device ManagerC、Disk ManagementD、Control Panel
Which of the following can be used to kill a running process?()A、Control PanelB、Computer ManagementC、Task ManagerD、Add/Remove Programs
Which three of the following network features are methods used to achieve high availability()A、Spanning Tree Protocol(STP)B、Delay reductionC、Hot Standby Routing Protocol(HSRP)D、Dynamic routing protocolsE、Quality of Service(QoS)F、Jitter management
Which device is normally used to translate telephone numbers or names to IP addresses for call routing in an H.323 network? ()A、call agentB、IP phoneC、multipoint control unitD、gatekeeper
Which of the following encryption methods is often used along with L2TP?()A、S/MIMEB、SSHC、3DESD、IPSec
After Microsoft Windows boots, a message appears stating that a service failed to start. Which of the following can be used to find more information about this error?()A、Disk ManagerB、Control PanelC、Start MenuD、Event Viewer
Which of the following methods can be used to apply a file system to a hard drive partition?()A、Device Manager MMCB、Format CommandC、Disk Management MMCD、Windows Explorer MenusE、FDISK Command
Which of the following backup methods should be used nightly to ensure backups capture all necessary data in the LEAST amount of time?()A、DailyB、IncrementalC、NormalD、Differential
A company has just implemented a disaster recovery plan in which critical business must be restored in a four hour window. Which of the following methods should be used to backup theservers?()A、Incremental backupB、Data only backupsC、SAN replicationD、Full backup
Which of the following commands will display any user defined verification methods?()A、cldumpB、clautover vC、clve c .custom vD、cllscustom t verify
Which of the following disk protection methods would be used to provide the maximum amount of data availability()A、RAID 0B、RAID 1C、RAID 3D、RAID 5
Which of the following tools is used to view historical information about tasks, database changes, messages, and notifications?()A、JournalB、Task CenterC、Control CenterD、Activity Monitor
Which of the following choices identifies a database component that will be used for multiplexing control files?()A、V$CONTROLFILE B、V$DATABASE C、init.ora D、DBA FILES
单选题Which of the following nondestructive testing methods can be used to detect a suspected subsurface defect in a tail-shaft liner?()ADye penetrantBMagnetic particleCUltrasonicDAll of the above
多选题On a Cisco network, which of the following modes of flow control are commonly used to mitigate the effects of busy data networks?()ASource Quench.BLearning.CBuffering.DWindowing.ECut-Through.
单选题Which of the following definitions can be used to define the term ‘offset ’ as a characteristic of controller action?()AThe period of time in which the set point and the control point coincideBThe periodic change between the set point and the control pointCThe variable difference between the set point and the control pointDThe constant difference between the set point and the control point
单选题Which of the following methods is normally used to lubricate bearings in a small high-speed diesel engine?()ASplash lubricationBPressure lubricationCSight feed lubricatorsDMechanical lubricators
单选题Which of the following methods might be used as the treatment on emulsified oil?()Agravity separationBcentrifugeCCycloneDCross-flow membrane filtration
多选题A site administrator is configuring Resource-level access control. Which of the following statements about Resource-level access control are true? Resource-level access control policies:()Aare optionalBare used to protect data beansCprovide coarse-grained access controlDnever specify a relationship
多选题Which three of the following network features are methods used to achieve high availability?()ASpanning Tree Protocol (STP)BDelay reductionCHot Standby Routing Protocol (HSRP)DDynamic routing protocolsEQuality of Service (QoS)FJitter management
单选题Which of the following backup methods should be used nightly to ensure backups capture all necessary data in the LEAST amount of time?()A DailyB IncrementalC NormalD Differential
单选题Which of the following best describes a full backup? ()AAll datafiles of a database BAll datafiles, archive logs, and control files CAll datafiles and control files DAll the used blocks in a datafile