网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
The deep-sea listening system makes use of ______.
A

the sophisticated technology of focusing sounds under water

B

the capability of sound to travel at high speed

C

the unique property of layers of ocean water in transmitting sound

D

low-frequency sounds traveling across different layers of water


参考答案

参考解析
解析:
细节题。最后一段叙述了不同海水层可充当声音传播的频道。听诊器的工作原理与此相同,把声音汇集起来,也正是这种声音汇集才能把大海里甚至微弱的声音,特别是那些低频的声音,传播至数千里之外。A项讲述的是听诊器的技术,非海水传音原理,与文中内容不符。只有C项与原文内容相符。
更多 “单选题The deep-sea listening system makes use of ______.A the sophisticated technology of focusing sounds under waterB the capability of sound to travel at high speedC the unique property of layers of ocean water in transmitting soundD low-frequency sounds traveling across different layers of water” 相关考题
考题 Communication always makes use of.A symbolsB wordsC languageD gesturesE All of the above.

考题 7 Communication always makes use of.A. symbolsB wordsC. languageD. gesturesE. All of the above

考题 89 Communication always makes use of.A. symbolsB. wordsC. languageD. gesturesE. All of the above

考题 187. It is hard to track the blue whale, the ocean’s largest creature, which has almost been killed off by commercial whaling and is now listed as an endangered species. Attaching radio devices to it is difficult, and visual sightings are too unreliable to give real insight into its behavior. So biologists were delighted early this year when, with the help of the Navy, they were able to track a particular blue whale for 43 days, monitoring its sounds. This was possible because of the Navy’s formerly top-secret system of underwater listening devices spanning the oceans. Tracking whales is but one example of all exciting new world just opening to civilian scientists after the cold war as the Navy starts to share and partly uncover its global network of underwater listening system built over the decades to track the ships of potential enemies. Earth scientists announced at a news conference recently that they had used the system for closely monitoring a deep-sea volcanic eruption for the first time and that they plan similar studies. Other scientists have proposed to use the network for tracking ocean currents and measuring changes in ocean and global temperatures. The speed of sound in water is roughly one mile a second, slower than through land but faster than through air. What is most important, different layers of ocean water can act as channels for sounds, focusing them in the same way a stethoscope (听诊器) does when it carries faint noises from a patient’s chest to a doctor’s ear. This focusing is the main reason that even relatively weak sounds in the ocean, especially low-frequency ones, can often travel thousands of miles. [共5题](1) The passage is chiefly about ________.(A) an effort to protect an endangered marine species(B) the exposure of a US Navy top-secret weapon(C) the civilian use of a military detection system(D) a new way to look into the behavior. of blue whales(2) The underwater listening system was originally designed ________.(A) to monitor deep-sea volcanic eruptions(B) to replace the global radio communications network(C) to study the movement of ocean currents(D) to trace and locate enemy vessels(3) The deep-sea listening system makes use of ________.(A) the unique property of layers of ocean water in transmitting sound(B) the capability of sound to travel at hligh speed(C) low-frequency sounds travelling across different layers of water(D) the sophisticated technology of focusing sounds under water(4) It can be inferred from the passage that ________.(A) blue whales are no longer endangered with the use of the new listening system(B) new radio devices should be developed for tracking the endangered blue whales(C) military technology has great potential in civilian use(D) opinions differ as to whether civilian scientists should be allowed to use military technology(5) Which of the following is true about the US Navy underwater listening network?(A) It has been replaced by a more advanced system.(B) It is now partly accessible to civilian scientists.(C) It became useless to the military after the cold war.(D) It is indispensable in protecting endangered species.

考题 Our teacher ___ great importance to listening comprehension. A、attachesB、givesC、takesD、makes

考题 What are two ways to view the system log files on a WX device? ()(Choose two.) A. Use the CLI and enter show log.B. Use the CLI and enter show all.C. Use the CLI and enter show logging.D. In WebView, choose Admin Tools Display System Log.

考题 An administrator tries to change the checksum_offload setting on ent0, but the chdev command responds that the adapter is busy.What can be done to resolve this?() A.Use chdev with -P flag and run cfgmgr.B.Use chdev with -R flag and run cfgmgr.C.Use chdev with -P flag and reboot the system.D.Use chdev with -R flag and reboot the system.

考题 ________(不会用)a computer makes it more difficult for him to do his academic research.(use)

考题 29. Which of the following is NOT true?A. In 1884,George Eastman invented a kind of film.B. Deep-sea divers take pictures of ocean plants and animals.C, The films were developed by the owners of the cameras in the pastD. Astronauts use cameras to take f,photos in space

考题 The teacher would use __________ to help students communicate in teaching speaking. A.substitution drills B.group discussion C.listening and acting D.reading aloud

考题 The teacher would use __________ to help students communicate in teaching speaking. A.substitution drills B.group discussion C.listening and acting D.reading aloud

考题 Company.com is running a p5-550 system with inactive processors. The system is managed using the Integrated Virtualization Manager. How would the system administrator activate two additional processors?()A、Use the Advanced Systems Management Interface to enter the Capacity on Demand Enablement code.B、Use the Web-based System Manager Interface to enter the Capacity on Demand enablement code.C、Use smitty or smit interface to enter the Capacity on Demand enablement code.D、Use oem_setup_env on the Virtual I/O Server to enter the Capacity on Demand enablement code.

考题 Which command can a system administrator use to verify that a tape is in backup format and is readable by the system?()A、tarB、tctlC、tcopyD、restore

考题 The IBM XIV Storage System is designed to be cost-efficient in all aspects, while deliveringoutstanding and consistent performance. Which of these features is currently UNAVAILABLE onthe XIV system?()A、single-tier architecture supports all kinds of storage in one environment and makes scaling easy B、built-in thin-provisioning allows the acquisition and installation of additional capacity to bedelayed until needed. C、innovative use of solid state disk drives offers excellent capacity-for-cost value while meetingenterprise performance standards D、use of off-the-shelf components makes customized hardware unnecessary and makes itpossible to integrate state-of-the-art hardware assoon as it becomes available.

考题 How can the system administrator determine if a system is running in 32-bit or 64-bit mode?()A、Use ’prtconf -c’ to see if the system is 64-bit enabledB、Check the /etc/inittab to see if /etc/method/cfg64 is enabledC、Use the ls -al to see if /unix is linked to /usr/lib/boot/unix_64D、Use the lslpp command to see if the bos.mp64 fileset is installed

考题 An administrator tries to change the checksum_offload setting on ent0, but the chdev command responds that the adapter is busy. What can be done to resolve this?()A、Use chdev with -P flag and run cfgmgr.B、Use chdev with -R flag and run cfgmgr.C、Use chdev with -P flag and reboot the system.D、Use chdev with -R flag and reboot the system.

考题 An administrator needs to change a system’s run level from level 2 to level 3. What is the appropriate  method to accomplish this()A、Use the reboot command.B、Edit the /etc/reboot file and reboot the system.C、Edit /etc/.init.state file and reboot the system.D、Use the telinit command

考题 What are two ways to view the system log files on a WX device? ()(Choose two.)A、Use the CLI and enter show log.B、Use the CLI and enter show all.C、Use the CLI and enter show logging.D、In WebView, choose Admin Tools Display System Log.

考题 The system analysts have requested heavy use of object features. The database design makes use of PL/SQL8 object types, methods, and LOB types. How do you work with these features on the client?()A、Write client-side subprograms containing the PL/SQL8 constructs, and move them into an object group. B、Write server-side subprograms, and call the subprograms from the form application. C、Store the PL/SQL8 constructs in a PL/SQL library, and attack the library to each form muddle in your application.

考题 You are the administrator of your company's network. You are preparing to deploy 20 new Windows 2000 Professional computers on your network. You want to be able to recover from disk failures and corrupt system files on the new computers. You want to configure the computers to automatically update their system configuration and emergency repair files on a scheduled bases.   What should you do?()A、Use the at command to schedule a weekly job to back up the boot partition.B、Use the at command to schedule a weekly job to run the system file checker.C、Use Windows backup to schedule a backup of the System State Data.D、Use Windows backup to schedule a backup of the system partition and the boot partition.

考题 You deploy a mobile messaging solution with Microsoft Exchange Server 2003 Service Pack 2.   When the application is running, it must not be able to access protected registry keys.   You need to ensure that the application meets the outlined requirement. What are two possible ways to achieve this goal?()A、Use Microsoft Windows Mobile 5.0 Pocket PC Phone Edition operating system.B、Use Microsoft Windows Mobile 2003 for Pocket PC operating system.C、Use Microsoft Windows Mobile 5.0 for Smartphone operating system.D、Use Microsoft Windows Mobile 2003 for Smartphone operating system.

考题 You need to design an access control strategy for the Payment folder for the Sales Managers group. What should you do?()A、Use IPSec in transport modeB、Use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)C、Use PEAP-EAP-TLSD、Use Encrypting File System (EFS) remote encryption

考题 单选题The IBM XIV Storage System is designed to be cost-efficient in all aspects, while deliveringoutstanding and consistent performance. Which of these features is currently UNAVAILABLE onthe XIV system?()A single-tier architecture supports all kinds of storage in one environment and makes scaling easy B built-in thin-provisioning allows the acquisition and installation of additional capacity to bedelayed until needed. C innovative use of solid state disk drives offers excellent capacity-for-cost value while meetingenterprise performance standards D use of off-the-shelf components makes customized hardware unnecessary and makes itpossible to integrate state-of-the-art hardware assoon as it becomes available.

考题 单选题The underwater listening system was originally designed ______.A to trace and locate enemy vesselsB to monitor deep-sea volcanic eruptionsC to study the movement of ocean currentsD to replace the global radio communications network

考题 单选题Your vessel is equipped with a fixed C02 system and a fire main system. In the event of an electrical fire in the engine room what is the correct procedure for fighting the fire?().A Use the C02 system and evacuate the engine roomB Use the fire main system and evacuate the engine roomC Evacuate the engine room and use the C02 systemD Evacuate the engine room and use the fire main system

考题 单选题It can be inferred from the passage that ______.A new radio devices should be developed for tracking the endangered blue whalesB blue whales are no longer endangered with the use of the new listening systemC opinions differ as to whether civilian scientists should be allowed to use military technologyD military technology has great potential in civilian use

考题 单选题Which of the following could the system administrator use to assist in debugging boot problems after the system is up?()A SMSB alogC fsckD bosboot