The safest device used to secure the end of the pendant wire when it is initially passed to the anchor handling vessel is a ______.A.Pelican hookB.Hydraulic deck stopperC.Connecting linkD.Shackle

The safest device used to secure the end of the pendant wire when it is initially passed to the anchor handling vessel is a ______.

A.Pelican hook

B.Hydraulic deck stopper

C.Connecting link

D.Shackle


相关考题:

An electrical device which employs a stationary armature and a rotating electromagnetic field is used aboard as aA.magnetic amplifierB.ship's service alternatorC.three-wire DC generatorD.saturable core reactor

Rewrite rules are used in which CoS scenario?() A.When a single device is configured to provide differentiated services.B.When multiple devices in a network are configured to use CoS to provide differentiated services.C.When a device is used to connect to another autonomous system.D.When CoS is used to classifiy traffic as low priority.

Which protocol is an open standard protocol framework that is commonly used in VPNs,to provid secure end-to-end communication?() A. L2TPB. IPsecC. PPTPD.RSA

A lashing used to secure two barges side by side,lashed in an "X" fashion,is called a ______.A.scissor wireB.towing wireC.breast wireD.cross wire

The American Petroleum Institute recommends magnetic particle inspection for ______.A.anchor chainB.wire ropeC.connecting linksD.pendant wires

Which statement concerning the lashings of containers with solid bar or wire rope lashings is TRUE ________.A.Stack weights should be less when using a solid bar lashing as compared to a wire lashingB.Stack heights may be increased when using a solid bar lashingC.Stack heights should be reduced when using a solid bar lashingD.Solid bars should be used for lashing the first tier only,with wire lashings on the higher tier(s)

The Cisco Smart Business Communications System offers support of third-party applications. When using TimeCard View, what device is used by employees to clock in and clock out?()  A、 IP phoneB、 wireless access pointC、 secure routerD、 time clock

You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()A、You must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.B、You must then zeroize the keys to reset secure shell before configuring other parameters.C、All vty ports are automatically enabled for SSH to provide secure management.D、The SSH protocol is automatically enabled.

Which protocol is an open standard protocol framework that is commonly used in VPNs,to provid secure end-to-end communication?()A、L2TPB、IPsecC、PPTPD、RSA

Which two statements are true regarding an Ethernet collision domain?()A、The likelihood of collisions occurring increases when a switch is used.B、The likelihood of collisions occurring increases when a hub is used.C、If a hub is used, the collision domain is limited to each device and the hub.D、If a switch is used, the collision domain is limited to each device and the switch.

单选题When securing a hook to the end of a wire rope you should use().AA bowline knotBA long spliceCAn overhand knot with a wire rope clipDWire rope clips with a thimble eye

单选题The major cause of anchor buoy pendant wire failures is().AcorrosionBrough weatherCdefective socketsDmishandling

单选题An electrical device which employs a stationary armature and a rotating electromagnetic field is used aboard ship as a ().Amagnetic amplifierBship’s service alternatorCthree-wire DC generatorDsaturable core reactor

单选题The safest device used to secure the end of the pendant wire when it is initially passed to the anchor handling vessel is a().Apelican hookBhydraulic deck stopperCconnecting linkDshackle

单选题When connecting the tow bridle to a tug, the end of the bridle is passed with a().Aheaving lineBshot lineChigh lineDmessenger line

单选题What does the term end-for-end refer to in regard to a wire towing hawser().ACutting off the bitter and towing ends of the wire ropeBSplicing two wire ropes togetherCRemoving the wire rope from the drum and reversing it so that the towing end becomes the bitter endDRemoving the wire rope from the drum and turning it over so that the wire bends in the opposite direction when rolled on a drum

单选题Which ISDN device converts the four-wire BRI signals from an S/T interface into two-wire signals of a U interface?()ATE1BNT-2CTADTE2ENT-1

单选题A lashing used to secure two barges side by side,lashed in an "X" fashion,is called a ().Ascissor wireBtowing wireCbreast wireDcross wire

单选题Which statement concerning the lashings of containers with solid bar or wire rope lashings is TRUE? ()AStack weights should be less when using a solid bar lashing as compared to a wire lashingBStack heights may be increased when using a solid bar lashingCStack heights should be reduced when using a solid bar lashingDSolid bars should be used for lashing the first tier only,with wire lashings on the higher tier(s)

单选题A fid is a().Amallet used when splicing wire ropeBsharp pointed crow bar used to unlay wire ropeCtapered steel pin used to separate wire ropeDtapered wooden pin used when splicing heavy rope

单选题You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()AYou must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.BYou must then zeroize the keys to reset secure shell before configuring other parameters.CAll vty ports are automatically enabled for SSH to provide secure management.DThe SSH protocol is automatically enabled.

单选题Which protocol should be used to establish a secure terminal connection to a remote network device? Select the best response.()AARPBSSHCTelnetDWEPESNMPv1FSNMPv2

单选题A device used to tighten up remaining slack in wire rope when you are making up to a tow in inland waters is a().Atripping lineBtripping bracketCnorman pinDsteamboat ratchet

多选题Which two statements are true regarding an Ethernet collision domain?()AThe likelihood of collisions occurring increases when a switch is used.BThe likelihood of collisions occurring increases when a hub is used.CIf a hub is used, the collision domain is limited to each device and the hub.DIf a switch is used, the collision domain is limited to each device and the switch.

单选题A deck fitting,used to secure line or wire rope,consisting of a single body with two protruding horns is called a().AbittBbollardCcapstanDcleat

单选题The Cisco Smart Business Communications System offers support of third-party applications. When using TimeCard View, what device is used by employees to clock in and clock out?()A IP phoneB wireless access pointC secure routerD time clock

单选题A device commonly used to secure the pendant wire when it is initially passed to an anchor handling vessel is().Apelican hookBconnecting linkCshackleDretaining hook