【单选题】
采用脉宽调制(PWM)进行直流电动机调速驱动时,通过改变 来改变电枢回路的平均电压,从而实现直流电动机的平滑调速 ___
A. 脉冲的宽度
B. 脉冲的频率
C. 脉冲的正负
D. 其他参数
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
含有微处理器,可进行程序编制或适应条件变化的接口是 ___
A. 智能接口
B. 被动接口
C. 主动接口
D. 零接口
【单选题】
通常,数控精密镗铣床等高精度数控设备,其伺服系统的控制方式均采用 ___
A. 闭环控制
B. 开环控制
C. 半闭环控制
D. 混合控制
【单选题】
下列哪个是传感器的动特性 ___
A. 幅频特性
B. 线性度
C. 灵敏度
D. 量程
【单选题】
光栅传感器的光栅是在一块长条形的光学玻璃上密集等间距平行的刻线,刻线数为 100 线/mm,此光栅传感器测量分辨率是 mm ___
A. 0.01
B. 0.1
C. 1
D. 0.001
【单选题】
计算机控制系统实际运行时,需要由用户自行编写 ,具有实时性、针对性、灵活性和通用性 ___
A. 应用软件
B. 开发软件
C. 系统软件
D. 实时软件
【单选题】
以下除了 ,均是由硬件和软件组成 ___
A. 继电器控制系统
B. PLC 控制系统
【单选题】
C.嵌入式系统 D.计算机控制系统 12210.以下抑制电磁干扰的措施,除了 ,其余都是从切断传播途径入手 ___
A. 软件抗干扰
B. 隔离
C. 滤波
D. 屏蔽
【单选题】
以下产品不属于机电一体化产品的是 ___
A. 电子计算机
B. 工业机器人
C. 空调
D. 复印机
【单选题】
多级齿轮传动中,各级传动比相等的分配原则适用于按 设计的传动链 ___
A. 重量最轻原则(小功率装置)
B. 输出轴的转角误差最小原则
C. 最小等效转动惯量原则
D. 重量最轻原则(大功率装置)
【单选题】
幅频特性和相频特性是模拟式传感器的 ___
A. 动态特性指标
B. 静态特性指标
【单选题】
C.输入特性参数 D.输出特性参数 12214.受控变量是机械运动的一种反馈控制系统称 ___
A. 伺服系统
B. 顺序控制系统
C. 数控机床
D. 工业机器人
【单选题】
闭环控制的驱动装置中,丝杠螺母机构位于闭环之外,所以它的 ___
A. 回程误差和传动误差都不会影响输出精度
B. 传动误差不影响输出精度,但回程误差影响输出精度
C. 回程误差不影响输出精度,但传动误差影响输出精度
D. 回程误差和传动误差都会影响输出精度
【单选题】
以下可对交流伺服电动机进行调速的方法是 ___
A. 改变电动机的供电频率
B. 改变电压的大小
【单选题】
C.改变电压的相位 D.改变电动机转子绕组匝数 12217.加速度传感器的基本力学模型是 ___
A. 阻尼—质量系统
B. 弹簧—质量系统
【单选题】
C.弹簧—阻尼系统 D.弹簧系统 12218.齿轮传动的总等效惯量与传动级数 ___
A. 在一定级数内有关
B. 无关
C. 有关
D. 在一定级数内无关
【单选题】
伺服控制系统一般包括控制器、被控对象、执行环节、比较环节和 检测环节等个五部分 ___ (A)
A. 检测环节
B. 转换电路
C. 存储电路
D. 换向结构
【单选题】
齿轮传动的总等效惯量随传动级数 ___
A. 增加而减小
B. 增加而增加
C. 减小而减小
D. 变化而不变
【单选题】
滚珠丝杠螺母副结构类型有两类:外循环插管式和 ___
A. 外循环反向器式
B. 内循环插管式
C. 内、外双循环
D. 内循环反向器式
【单选题】
直流测速发电机输出的是与转速 ___
A. 成正比的直流电压
B. 成反比的交流电压
C. 成正比的交流电压
D. 成反比的直流电压
【单选题】
检测环节能够对输出进行测量,并转换成比较环节所需要的量纲,一般包括传感器和 ___
A. 转换电路
B. 控制电路
C. 调制电路
D. 逆变电路
【单选题】
以下可对异步电动机进行调速的方法是 ___
A. 改变电动机的供电频率
B. 改变电压的大小
【单选题】
C.改变电压的相位 D.改变电动机转子绕组匝数 12226.执行元件:能量变换元件,控制机械执行机构运动,可分为 、液压式和气动式等 ___
A. 电气式
B. 电磁式
C. 磁阻式
D. 机械式
【单选题】
步进电动机,又称电脉冲马达,是通过 决定转角位移的一种伺服电动机 ___
A. 脉冲的数量
B. 脉冲的宽度
C. 脉冲的相位
D. 脉冲的占空比
【单选题】
PWM 指的是 ___
A. 脉宽调制
B. 计算机集成系统
C. 机器人
D. 可编程控制器
【单选题】
在数据库设计中,将 E-R 图转换成关系数据模型的过程属于 ___
A. 逻辑设计阶段
B. 需求分析阶段
【单选题】
C.概念设计阶段 D.物理设计阶段 12230.在数控系统中,复杂连续轨迹通常采用 方法实现 ___
A. 插补
B. 切割
C. 画线
D. 自动
【单选题】
在三相电路中,功率因数角是指 ___
A. 相电压和相电流之间的夹角
B. 线电压和相电流之间的夹角
C. 相电压和线电流之间的夹角
D. 线电压和线电流之间的夹角
【单选题】
用户的功率因数低,将不会导致 ___
A. 用户有功负荷提升
B. 用户电压降低
【单选题】
C.设备容量需求增大 D.线路损耗增大 12233.在正弦交流电的一个周期内,随着时间变化而改变的是 ___
A. 瞬时值
B. 最大值
C. 有效值
D. 平均值
【单选题】
在并联交流电路中,总电流等于各个分支电流的 ___
A. 相量和
B. 代数和
C. 总和
D. 方根和
【单选题】
识别通信电缆规格形式和用途的代号是 ___
A. 电缆型号
B. 电缆绝缘
C. 电缆芯线
D. 外护层
【单选题】
在并联直流电路中,总电流为各支路电流 ___
A. 之和
B. 之积
C. 之商
D. 倒数和
【单选题】
两只额定电压相同的灯泡,串联在适当的电压上,则功率较大的灯泡 ___
A. 发热量小
B. 发热量大
【单选题】
C.与功率较小的发热量相等 D.无法比较 12239.一个线圈的电感与 无关 ___
A. 外加电压
B. 尺寸
C. 有无铁芯
D. 匝数
【单选题】
在电力系统中,发电机的容量和变压器的容量一般呈现出一种 的关系 ___
A. 变压器的容量大于发电机容量
B. 几乎是相等的局面
C. 发电机容量大于变压器容量
D. 不能确定
【单选题】
二次回路中文字符号 FU 表示 ___
A. 熔断器
B. 电阻
C. 白炽灯
D. 远动信号
【单选题】
由测量仪表、继电器、控制及信号器具等设备连接成的回路称为 ___
A. 二次回路
B. 一次回路
C. 仪表回路
D. 远动回路
【单选题】
所谓对称三相负载就是 ___
A. 三相负载阻抗值相等,且阻抗角相等
B. 三个相电压相等且相位角互差 120°
C. 三个相电流有效值相等,三个相电压相等且相位角互差 120°
D. 三个相电流有效值相等
【单选题】
交流电流 I 通过某电阻,在一定时间内产生的热量,与某直流电流 I 在相同时间内通过该电阻所产生的热量相等,那么就把此直流电流 I 定义为交流电流 i 的 ___
A. 有效值
B. 最大值
C. 最小值
D. 瞬时值
【单选题】
有两个正弦量,其瞬时值的表达式分别为:u=220sin ωt-10°),i=5sin ωt-40°),可见 ___
A. 电流滞后电压 30°
B. 电流滞后电压 40°
推荐试题
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.