单选题On commonly used ships,if two A√Cgenerators are operated in parallel, the load is distributed evenly by ().Avarying the D-Cexciter voltageBvarying the reluctance of the air gapCregulating the speed of prime moverDshorting out part of the armature windings
单选题
On commonly used ships,if two A√Cgenerators are operated in parallel, the load is distributed evenly by ().
A
varying the D-Cexciter voltage
B
varying the reluctance of the air gap
C
regulating the speed of prime mover
D
shorting out part of the armature windings
参考解析
解析:
暂无解析
相关考题:
commonly, two approaches are frequently used to describe different processes of listening. they are _____________. A. bottom-up model and top-down modelB. before-class model and after-class modelC. pre-listening model and post-listening modelD. pre-listening model and while-listening model
Power operated cranes used on a ship must not be powered by ______.A.diesel engineB.chargeable batteriesC.electric motorsD.gasoline engines
___endorsement is the simplest and the most commonly used form. of endorsement. A.blankB.restrictiveC.specialD.qualified
commonly, two approaches are frequently used to describe different processes of listening. they are ______. A、pre-listening model and post-listening modelB、bottom-up mo del and top-down modelC、pre-listening model and while-listening modelD、before- class model and after-class model
Which two statements regarding symmetric key encryption are true?() (Choose two.) A. The same key is used for encryption and decryption.B. It is commonly used to create digital certificate signatures.C. It uses two keys: one for encryption and a different key for decryption.D. An attacker can decrypt data if the attacker captures the key used for encryption.
Which of the following protocols is commonly used for VoIP technology?() A.TelnetB.SMTPC.SIPD.SNMP
Which two data intergrity algorithms are commonly used in VPN solutions?() A.HMAC-MD5B.RSAC.HMAC-SHA-1D.DH1E.DH2
When flammable liquids are handled in a compartment on a vessel,the ventilation for that area should be ______.A.operated continuously while vapors may be presentB.operated intermittently to remove vaporsC.available on standby for immediate useD.shut down if an explosive mixture is present
很多船上在每个舱口处都有两个吊杆及两台起货机。()A、Many ships have two derricks at each hatch.B、Many ships have two winches at each hatch.C、Many ships have two derricks and two winches at each hatch.D、Many ships have two derricks and two winches at each hatch cover.
Which two data intergrity algorithms are commonly used in VPN solutions?()A、HMAC-MD5B、RSAC、HMAC-SHA-1D、DH1E、DH2
Which one of the following is the most commonly used layer 2 network device?()A、HubB、BridgeC、SwitchD、RouterE、RepeatersF、None of the above
Which of the following protocols is commonly used for VoIP technology?()A、TelnetB、SMTPC、SIPD、SNMP
Which two statements regarding asymmetric key encryption are true?()A、The same key is used for encryption and decryption.B、It is commonly used to create digital certificate signatures.C、It uses two keys: one for encryption and a different key for decryption.D、An attacker can decrypt data if the attacker captures the key used for encryption
单选题()with various arrangements of barrels are the usual mooring equipment used on board ships.AcranesBwinchesCcapstansDwindlass
单选题Which one of following statement is not true concerning the suitable sites of the direct acting relief valve and the pilot operated relieve valve?()Athe direct acting relief valve is used for controlling lower flows and pressureBthe pilot operated relief valve is used for controlling higher flows and pressureCthe pilot operated relief valve is used for controlling lower flows and pressureDthe controlling accuracy of direct acting relief valve is worse than that of the pilot operated relief valve
单选题Should that kind of weather(),the two ships would touch each other.ApersistBpersistsCto persistDpersisted
多选题Which two data intergrity algorithms are commonly used in VPN solutions?()AHMAC-MD5BRSACHMAC-SHA-1DDH1EDH2
多选题Which two statements regarding asymmetric key encryption are true?()AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption
单选题Which of the following connectors is commonly used on a shielded twisted pair cable?()ABNCBRJ-45CFDHDMI
单选题() the engines, the diesel engine is() used engine on board.ABetween;more commonlyBAmong;the most commonlyCBetween;not more commonlyDAmong;not the most commonly
多选题Which two statements regarding symmetric key encryption are true?() (Choose two.)AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption.
单选题If two AC generators are operated in parallel, the load is distributed evenly by()Aa rheostatBa balancing coilCchanging field excitationDadjusting the governor settings
单选题On tank vessels equipped with power operated cargo tank valves, the type of power operator most commonly used is ().AhydraulicBelectricCsteamDdiesel
单选题With reference to rules governing steering gear, which one of the following rules is incorrect? ()AIt is required that all ships are provided with two independent steering gear systems that is one main and one auxiliaryBThe auxiliary gear could be power operated in passenger shipsCThe auxiliary gear must be of adequate strength and sufficient to steer a ship at navigable speedDAll moving parts of the steering gear must be guarded against any possible damage
单选题Peck and Hale gear is used most commonly for securing().AautomobilesBbaled cargoClarge wooden cratesDpalletized cargo