单选题Which one of the following rules is not regarding two power-driven vessels meeting end or nearly end on so as to involve risk of collision().AEach shall keep her course and speedBEach shall alter her course to starboardCEach shall pass on the portside to the otherDEach shall indicate such action by one short blast on the whistle
单选题
Which one of the following rules is not regarding two power-driven vessels meeting end or nearly end on so as to involve risk of collision().
A
Each shall keep her course and speed
B
Each shall alter her course to starboard
C
Each shall pass on the portside to the other
D
Each shall indicate such action by one short blast on the whistle
参考解析
解析:
暂无解析
相关考题:
Examine the following RMAN command:Which two statements are true regarding the backup taken by using the above RMAN command?() A. Only data files and the control file are backed up.B. Archived redo logs are backed up only I f the database is open during the backup.C. The backup is deleted after one day, regardless of the default retention policy settings.D. The backup becomes obsolete after one day, regardless of the default retention policy settings.
Which two statements regarding symmetric key encryption are true?() (Choose two.) A. The same key is used for encryption and decryption.B. It is commonly used to create digital certificate signatures.C. It uses two keys: one for encryption and a different key for decryption.D. An attacker can decrypt data if the attacker captures the key used for encryption.
Which two statements are true regarding AppFlow? ()(Choose two.) A. Accelerates NFS file sharing, MAPI, and HTTP 1.0.B. Accelerates CIFS, MAPI, and additional TCP traffic specified by app rules.C. Accelerates Samba 3.0, Outlook communications in the enterprise, and HTTP.D. Accelerates Windows XP-based file sharing, MAPI, and access to the intranet web portal.
Which of the following is the correct configuration for a RAID 5 array?() A. A two disk set with one data stripB. A three disk set with two data strips and a parity stripC. A two disk set with two data stripsD. A four disk set with two sets of data strips
There are two networks sharing the same office space. One network already has an 802.11g accesspoint. The second network acquires one as well. If known, which of the following would help keep the two networks from interfering with each other?()A.ChannelB.WEP keyC.Pre-shared keyD.Encryption type
Exhibit: Which of the following are true regarding the command output shown in the display (Choose two.)()。 A.There are at least two routers participating in the RIP process.B.A ping to 192.168.168.2 will be successful.C.A ping to 10.0.15.2 will be successful.D.RtrA has three interfaces participating in the RIP process.
Which one of the following studies the internal structure of words, and the rules by which words are ( ) formed? A.Morphology B.Syntax C.Phonology D.Semantics
Which of the following is the correct configuration for a RAID 5 array?()A、A two disk set with one data stripB、A three disk set with two data strips and a parity stripC、A two disk set with two data stripsD、A four disk set with two sets of data strips
A recently ordered server came standard with one 3.0GHz processor. It is capable of handling fourtotal processors. Which of the following processor combinations can be used in this server?()A、 One, two, three or four processorsB、 One, two, or three processorsC、 One, three, or four processorsD、 One, two or four processors
Which two statements about static NAT are true? ()(Choose two.)A、Static NAT can only be used with destination NAT.B、Static NAT rules take precedence over overlapping dynamic NAT rules.C、NAT rules take precedence over overlapping static NAT rules.D、A reverse mapping is automatically created.
Which two statements regarding asymmetric key encryption are true?()A、The same key is used for encryption and decryption.B、It is commonly used to create digital certificate signatures.C、It uses two keys: one for encryption and a different key for decryption.D、An attacker can decrypt data if the attacker captures the key used for encryption
Which two statements are true regarding the WebLogic domain?()A、A WebLogic domain can have more than one Administration server.B、A WebLogic domain has at least one WebLogic server.C、A WebLogic domain can have at the most one cluster. D、A WebLogic domain can cross multiple physical machines. E、Each WebLogic domain is associated with a different Node Manager.
Examine the following RMAN command: BACKUP DATABASE TAG TESTDB KEEP UNTIL ’SYSDATE+1’ RESTORE POINT TESTDB06; Which two statements are true regarding the backup taken by using the above RMAN command?() A、 Only data files and the control file are backed up.B、 Archived redo logs are backed up only if the database is open during the backup.C、 The backup is deleted after one day,regardless of the default retention policy settings. D、 The backup becomes obsolete after one day,regardless of the default retention policy settings.
单选题A customer has two different applications, each requiring two processors. They are evaluating the following three alternatives: 1) Two p5-520s each with two processors and 4GB memory 2) One partitioned p5-550 with four processors and 8GB memory 3) One partitioned p5-570 with four processors and 8GB memory All three solutions will work. However, when helping the customer decide which solution is best for their environment, the pSeries technical specialist should convey which of the following pieces of information?()A AB BC CD D
单选题There are two classes of vessels which,to the extent necessary to carry out their work,do not have to comply with the rule regarding traffic separation schemes. One of these is a vessel().Aengaged in fishing in a traffic laneBservicing a submarine cableCtowing anotherDengaged on pilotage duty
单选题Which one of the following is a counterexample to the statement “If two angles are supplementary, then they are right angles?”AIf two angles are complementary, then they are not right angles.BIf two angles are fight angles, then they are supplementary.CIf two angles are not supplementary, then they are not right angles.DIf two angles are supplementary, then one could measure 100° and one could measure 80°.EIf two angles are not fight angles, then they are not supplementary.
多选题Which two statements regarding asymmetric key encryption are true?()AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption
多选题Which two statements in a source NAT configuration are true regarding addresses, rule-sets, or rules that overlap?()(Choose two.)AAddresses used for NAT pools should never overlap.BIf more than one rule-set matches traffic, the rule-set with the most specific context takes precedence.CIf traffic matches two rules within the same rule-set, both rules listed in the configuration are applied.DDynamic source NAT rules take precedence over static source NAT rules.
单选题There are two networks sharing the same office space. One network already has an 802.11g accesspoint. The second network acquires one as well. If known, which of the following would help keep the two networks from interfering with each other?()AChannelBWEP keyCPre-shared keyDEncryption type
单选题Which role does the teacher play in the following activities? When the students are doing a group-work task, the teacher joins one or two groups for a short period of time.AorganizerBcontrollerCparticipantDassessor
单选题A recently ordered server came standard with one 3.0GHz processor. It is capable of handling fourtotal processors. Which of the following processor combinations can be used in this server?()A One, two, three or four processorsB One, two, or three processorsC One, three, or four processorsD One, two or four processors
单选题Which of the following conditions must exist for heat to flow from one object to another?()AThe two objects must be in physical contactBThe two objects must be the same sizeCThere must be an existing temperature differentialDThere must be an existing weight differential
多选题Which two statements are true regarding single row functions?()AThey accept only a single argumentBThey can be nested only to two levelsCArguments can only be column values or constantsDThey always return a single result row for every row of a queried tableEThey can return a data type value different from the one that is referenced
多选题Which two statements regarding symmetric key encryption are true?() (Choose two.)AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption.
多选题Which two statements about static NAT are true? ()(Choose two.)AStatic NAT can only be used with destination NAT.BStatic NAT rules take precedence over overlapping dynamic NAT rules.CNAT rules take precedence over overlapping static NAT rules.DA reverse mapping is automatically created.
单选题With reference to rules governing steering gear, which one of the following rules is incorrect? ()AIt is required that all ships are provided with two independent steering gear systems that is one main and one auxiliaryBThe auxiliary gear could be power operated in passenger shipsCThe auxiliary gear must be of adequate strength and sufficient to steer a ship at navigable speedDAll moving parts of the steering gear must be guarded against any possible damage
多选题Which two statements are true regarding AppFlow? ()(Choose two.)AAccelerates NFS file sharing, MAPI, and HTTP 1.0.BAccelerates CIFS, MAPI, and additional TCP traffic specified by app rules.CAccelerates Samba 3.0, Outlook communications in the enterprise, and HTTP.DAccelerates Windows XP-based file sharing, MAPI, and access to the intranet web portal.