【判断题】
双鼠笼电动机的内鼠笼电阻小,感抗大,启动时产生的力矩较小
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【判断题】
电动机铭牌上的温升,是指定子铁芯的允许温升
【判断题】
直流电机的换向过程,是一个比较复杂的过程,换向不良的直接后果是碳刷发热碎裂
【判断题】
感应电动机在额定负荷下,当电压升高时,转差率与电压的平方成反比地变化;当电压降低时,转差率迅速增大
【判断题】
异步电动机在负载下运行时,其转差率比空载运行时的转差率大
【判断题】
双鼠笼式或深槽式电动机最大特点是起动性能好
【判断题】
双笼式异步电动机刚起动时工作绕组感抗小,起动绕组感抗大
【判断题】
深槽式电动机是利用交流电的集肤效应作用来增加转子绕组起动时的电阻以改善起动特性的
【判断题】
异步电动机同直流电动机和交流同步电动机相比较,具有结构简单、价格便宜、工作可靠、使用方便等一系列优点,因此被广泛使用
【判断题】
电动机因检修工作拆过接线时,应进行电动机空转试验
【判断题】
厂用一般电动机断笼条多发生在频繁启动或重载启动时
【判断题】
电动机可以在额定电压变动-5% ~ +10%范围内运行,其额定出力不变
【判断题】
电动机在额定出力运行时,相间电压不平衡不超过10%
【判断题】
电动机在运行时有两个主要力矩:使电动机转动的电磁力矩;由电动机带动的机械负载产生的阻力力矩
【判断题】
电动机着火可以使用泡沫灭火器或砂土灭火
【判断题】
为防止电动机过载运行,所以要配置熔断器
【判断题】
改变直流电动机的旋转方向,一是要改变电枢绕组电流方向,二是改变磁场绕组电流方向,二者缺一不可
【判断题】
电动机的速断保护的动作电流,应按躲过正常负荷电流来定
【判断题】
改变三相交流电动机旋转方向,只要任意对调其二根电源线即可
【判断题】
电动机的滑动轴承温度不能超过65℃,滚动轴承不能超过75℃
【判断题】
鼠笼电动机转子断条,有起动时冒火花、静子电流时大时小,振动现象
【判断题】
异步电动机的启动电流一般为电动机额定电流的4~7倍
【判断题】
对于电动机负载,通常按1.5~2.5倍电动机额定电流选择熔体的额定电流
【判断题】
发现电动机进水及受潮现象时,应测得绝缘合格后方可启动
【判断题】
三相异步电动机定子绕组断一相时仍可启动起来
【判断题】
三相异步电动机运行中定子回路断一相,仍可继续转动
【判断题】
异步电动机电源电压过低时,定子绕组所产生的旋转磁场减弱,启动转矩小,因此,电动机启动困难
【判断题】
异步电动机启动力矩小,其原因是启动时功率因数低,电流的有功部分小
【判断题】
异步电动机相间突然短路,当发生在定子绕组端部附近时,故障最严重
【判断题】
对于电动机负载,熔断器的熔断电流应保证启动状态(电流可达5~7倍额定电流)下不致熔断
【判断题】
电动机缺相运行时,电流表指示一定上升,电动机本体温度升高,同时振动增大,声音异常
【判断题】
电动机转子与定子摩擦冒火应紧急停止运行
【判断题】
转动设备电动机及电缆冒烟冒火,有短路象征,应紧急停止运行
【判断题】
保安电源的作用是当400V厂用电源全部失去后,保障机组安全停运
【判断题】
较长时间停止供电,也不致于直接影响电能生产的机械,称第二类厂用机械
【判断题】
高压厂用电压采用多少伏,取决于选用的电动机额定电压
【判断题】
厂用电工作的可靠性,在很大程度上决定于电源的连接方式
【判断题】
发电厂中的厂用电是重要负荷,必须按电力系统中第一类用户对待
【判断题】
在正常运行方式下、所有的厂用电源均投入工作,把没有明显断开的备用电源称为暗备用
【判断题】
保安段的工作电源和事故电源之间进行切换时,应先断开其工作电源开关,然后再合上其备用电源开关
推荐试题
【填空题】
43.1957年10月4日,苏联把世界上第一颗 ___ 送入地球近地轨道.
【填空题】
44.中央军委下属机关有___个部<厅>、___个委员会、___个直属机构。
【填空题】
46.天基武器系统主要指攻击对方航天器用的卫星和卫星平台,包括 ___ 、 ___和___ 等。
【填空题】
47.中国人民解放军海军成立于___年。
【填空题】
48.新概念武器主要有 ___ 、___、 ___ 、 ___ 、___ 等。
【填空题】
49.核武器具有____、冲击波、____ ___、核电磁脉冲和放射性沾染等五种杀伤破坏因素。
【填空题】
50.精确制导技术是指采用高技术直接命中概率超过___以上的武器。
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
【单选题】
What is the actual los privilege level of User Exec mode?___
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker