当前位置:文档之家› 70-646试题英文版

70-646试题英文版

70-646试题英文版
70-646试题英文版

70-646.ExamwithTestletAnswers.by.TheWolf

(12/28/2010 valid)

Exam A

QUESTION 1

You need to recommend a Windows Server 2008 R2 server configuration that meets the following requirements: ·Supports the installation of Microsoft SQL Server 2008

·Provides redundancy for SQL services if a single server fails

What should you recommend?

A.Install a Server Core installation of Windows Server 2008 R2 Enterprise on two servers. Configure the servers in a failover cluster.

B.Install a full installation of Windows Server 2008 R2 Standard on two servers. Configure Network Load Balancing on the two servers.

C.Install a full installation of Windows Server 2008 R2 Enterprise on two servers. Configure Network Load Balancing on the two servers.

D.Install a full installation of Windows Server 2008 R2 Enterprise on two servers. Configure the servers in a failover cluster.

Answer: D

QUESTION 2

Your network consists of a single Active Directory domain. Your main office has an Internet connection.

Your company plans to open a branch office. The branch office will connect to the main office by using a WAN link. The WAN link will have limited bandwidth. The branch office will not have access to the Internet. The branch office will contain 30 Windows Server 2008 R2 servers. You need to plan the deployment of the servers in the branch office.

The deployment must meet the following requirements:

·Installations must be automated.

·Computers must be automatically activated.

·Network traffic between the offices must be minimized.

What should you include in your plan?

A.In the branch office, implement Key Management Service (KMS), a DHCP server, and Windows Deployment Services (WDS).

https://www.doczj.com/doc/5f16723957.html,e Multiple Activation Key (MAK) Independent Activation on the servers. In the main office, implement a DHCP server and Windows Deployment Services (WDS).

C.In the main office, implement Windows Deployment Services (WDS). In the branch office, implement a DHCP server and implement the Key Management Service (KMS).

https://www.doczj.com/doc/5f16723957.html,e Multiple Activation Key (MAK) Independent Activation on the servers. In the main office, implement a DHCP server. In the branch office, implement Windows Deployment Services (WDS).

Answer: A

QUESTION 3

Your network contains a Webbased

application that runs on Windows Server 2003. You plan to migrate the Webbased application to Windows Server

2008 R2. You need to recommend a server configuration to support the Webbased application.

The server configuration must meet the following requirements:

·Ensure that the application is available to all users if a single server?fails

·Support the installation of .NET applications

·Minimize software costs

What should you recommend?

A.Install the Server Core installation of Windows Server 2008 R2 Standard on two servers. Configure the servers in a Network Load Balancing cluster.

B.Install the full installation of Windows Server 2008 R2 Web on two servers. Configure the servers in a Network Load Balancing cluster.

C.Install the full installation of Windows Server 2008 R2 Enterprise on two servers. Configure the servers in a failover cluster.

D.Install the full installation of Windows Server 2008 R2 Datacenter on two servers. Configure the servers in a failover cluster.

Answer: B

QUESTION 4

Your company purchases 15 new 64bit servers as follows:

·Five of the servers have a single processor.

·Five of the servers have a single dual core processor.

·Five of the servers have two quad core processors.

You plan to deploy Windows Server 2008 R2 on the new servers by using Windows Deployment Services (WDS). You need to recommend a WDS install image strategy that meets the following requirements:

·Minimizes the number of install images

·Supports the deployment of Windows Server 2008 R2

What should you recommend?

A.one install image file that contains three install images

B.one install image file that contains a single install image

C.two install image files that each contain a single install image

D.three install image files that each contain a single install image

Answer: B

QUESTION 5

Your network contains a single Active Directory site.

You plan to deploy 1,000 new computers that will run Windows 7 Enterprise. The new computers have Preboot Execution Environment (PXE) network adapters.

You need to plan the deployment of the new computers to meet the following requirements:

·Support 50 simultaneous installations of Windows 7

·Minimize the impact of network operations during the deployment of the new computers

·Minimize the amount of time required to install Windows 7 on the new computers

What should you include in your plan?

A.Deploy the Windows Deployment Services (WDS) server role. Configure the IP Helper tables on all routers.

B.Deploy the Windows Deployment Services (WDS) server role. Configure each WDS server by using native mode.

C.Deploy the Windows Deployment Services (WDS) server role and the Transport Server feature. Configure the Transport Server to use a custom network profile.

D.Deploy the Windows Deployment Services (WDS) server role and the Transport Server feature. Configure the Transport Server to use a static multicast address range.

Answer: D

QUESTION 6

Your network consists of a single Active Directory site that includes two network segments. The network segments connect by using a router that is RFC 1542 compliant.

You plan to use Windows Deployment Services (WDS) to deploy Windows Server 2008 R2 servers. All new servers support PreBoot Execution Environment (PXE).

You need to design a deployment strategy to meet the following requirements:

·Support Windows Server?2008 R2

·Deploy the servers by using WDS in both network segments

·Minimize the number of servers used to support WDS

What should you include in your design?

A.Deploy one server. Install WDS and DHCP on the server. Configure the IP Helper tables on the router between the network segments.

B.Deploy two servers. Install WDS and DHCP on both servers. Place one server on each of the network segments. Configure both servers to support DHCP option 60.

C.Deploy two servers. Install WDS and DHCP on both servers. Place one server on each of the network segments. Configure both servers to support DHCP option 252.

D.Deploy two servers. Install WDS and DHCP on one server. Install DHCP on the other server. Place one server on each of the network segments. Configure both servers to support DHCP option 60.

Answer: A

QUESTION 7

Your company has 250 branch offices. Your network contains an Active Directory domain. The domain controllers run Windows Server 2008 R2. You plan to deploy Readonly Domain Controllers (RODCs) in the branch offices. You need to plan the deployment of the RODCs to meet the following requirements:

·Build each RODC at the designated branch office.

·Ensure that the RODC installation source files do not contain cached secrets.

·Minimize the bandwidth used during the initial synchronization of Active Directory Domain Services

(AD?DS).

What should you include in your plan?

https://www.doczj.com/doc/5f16723957.html,e Windows Server Backup to perform a full backup of an existing domain controller. Use the backup to build the new RODCs.

https://www.doczj.com/doc/5f16723957.html,e Windows Server Backup to perform a custom backup of the critical volumes of an existing domain controller. Use the backup to build the new RODCs.

C.Create a DFS namespace that contains the Active Directory database from one of the existing domain controllers. Build the RODCs by using an answer file.

D.Create an RODC installation media. Build the RODCs from the RODC installation media.

Answer: D

QUESTION 8

Your network consists of a single Active Directory domain. The network is located on the 172.16.0.0/23

subnet.The company hires temporary employees. You provide user accounts and computers to the temporary employees. The temporary employees receive computers that are outside the Active Directory domain. The temporary employees use their computers to connect to the network by using wired connections and

wireless connections. The company's security policy specifies that the computers connected to the network must have the latest updates for the operating system.

You need to plan the network's security so that it complies with the company's security policy. What should

you include in your plan?

A.Implement a Network Access Protection (NAP) strategy for the 172.16.0.0/23 subnet.

B.Create an extranet domain within the same forest. Migrate the temporary employees' user accounts to the extranet domain. Install the necessary domain resources on the 172.16.0.0/23 subnet.

C.Move the temporary employees' user accounts to a new organizational unit (OU). Create a new Group Policy object (GPO) that uses an intranet Microsoft Update server. Link the new GPO to the new OU.

D.Create a new subnet in a perimeter network. Relocate the wireless access point to the perimeter network. Require authentication through a VPN server before allowing access to the internal resources.

Answer: A

QUESTION 9

Your company has a main office and two branch offices. The main office is located in London. The branch offices are located in New York and Paris. Your network consists of an Active Directory forest that contains three domains named https://www.doczj.com/doc/5f16723957.html,, https://www.doczj.com/doc/5f16723957.html,, and https://www.doczj.com/doc/5f16723957.html,. All domain controllers run Windows Server 2008 R2 and have the DNS Server server role installed. The domain controllers for https://www.doczj.com/doc/5f16723957.html, are located in the London office. The domain controllers for https://www.doczj.com/doc/5f16723957.html, are located in the Paris office. The domain controllers for https://www.doczj.com/doc/5f16723957.html, are located in the New York office. A domain controller in the https://www.doczj.com/doc/5f16723957.html, domain has a standard primary DNS zone for https://www.doczj.com/doc/5f16723957.html,. A

domain controller in the https://www.doczj.com/doc/5f16723957.html, domain has a standard primary DNS zone for https://www.doczj.com/doc/5f16723957.html,. A domain controller in the https://www.doczj.com/doc/5f16723957.html, domain has a standard primary DNS zone for https://www.doczj.com/doc/5f16723957.html,. You need to plan a name resolution strategy for the Paris office that meets the following requirements:

·If a WAN link fails, clients must be able to resolve hostnames for https://www.doczj.com/doc/5f16723957.html,.

·If a WAN link fails, clients must be able to resolve hostnames for https://www.doczj.com/doc/5f16723957.html,.

·The DNS servers in Paris must be updated when new authoritative DNS servers are added to https://www.doczj.com/doc/5f16723957.html,. What should you include in your plan?

A.Configure conditional forwarding for https://www.doczj.com/doc/5f16723957.html,. Configure conditional forwarding for https://www.doczj.com/doc/5f16723957.html,.

B.Create a standard secondary zone for https://www.doczj.com/doc/5f16723957.html,. Create a standard secondary zone for https://www.doczj.com/doc/5f16723957.html,.

C.Convert the standard zone into an Active Directoryintegrated zone. Add all DNS servers in the forest to the root hints list.

D.Create an Active Directoryintegrated stub zone for https://www.doczj.com/doc/5f16723957.html,. Create an Active Directoryintegrated stub zone for https://www.doczj.com/doc/5f16723957.html,.

Answer: B

QUESTION 10

Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2. You need to implement a Certificate Services solution that meets the following requirements:

·Automates the distribution of certificates for internal users

·Ensures that the network's certificate infrastructure is as secure as possible

·Gives external users access to resources that use certificatebased authentication

What should you do?

A.Deploy an online standalone root certification authority (CA). Deploy an offline standalone root CA.

B.Deploy an offline enterprise root certification authority (CA). Deploy an offline enterprise subordinate CA.

C.Deploy an offline standalone root certification authority (CA). Deploy an online enterprise subordinate CA. Deploy an online standalone subordinate CA.

D.Deploy an online standalone root certification authority (CA). Deploy an online enterprise subordinate CA. Deploy an online standalone subordinate CA.

Answer: C

QUESTION 11

Your network contains an Active Directory forest named https://www.doczj.com/doc/5f16723957.html,.

You plan to deploy a new child domain named https://www.doczj.com/doc/5f16723957.html,. The child domain will contain two domain controllers. Both domain controllers will have the DNS Server server role installed. All users and computers in the branch office will be members of the https://www.doczj.com/doc/5f16723957.html, domain. You need to plan the DNS infrastructure for the child domain to meet the following requirements:

·Ensure resources in the root domain are accessible by fully qualified domain names.

·Ensure resources in the child domain are accessible by fully qualified domain names.

·Provide name resolution services in the event that a single server fails for a prolonged period of time. ·Automatically recognize when new DNS servers are added to or removed from the https://www.doczj.com/doc/5f16723957.html, domain.

What should you include in your plan?

A.On both domain controllers, add a conditional forwarder for https://www.doczj.com/doc/5f16723957.html, and create a standard primary zone for https://www.doczj.com/doc/5f16723957.html,.

B.On both domain controllers, modify the root hints to include the domain controllers for https://www.doczj.com/doc/5f16723957.html,. On one domain controller, create an Active Directoryintegrated zone for https://www.doczj.com/doc/5f16723957.html,.

C.On one domain controller create an Active Directoryintegrated zone for https://www.doczj.com/doc/5f16723957.html, and create an Active Directoryintegrated stub zone for https://www.doczj.com/doc/5f16723957.html,.

D.On one domain controller, create a standard primary zone for https://www.doczj.com/doc/5f16723957.html,. On the other domain controller, create a standard secondary zone for https://www.doczj.com/doc/5f16723957.html,.

Answer: C

QUESTION 12

Your network is configured as shown in the following diagram.

You deploy an enterprise certification authority (CA) on the internal network. You also deploy a Microsoft Online Responder on the internal network. You need to recommend a secure method for Internet users to verify the validity of individual certificates.

The solution must minimize network bandwidth.

What should you recommend?

A.Deploy a subordinate CA on the perimeter network.

B.Install a standalone CA and the Network Device Enrollment Service (NDES) on a server on the perimeter network.

C.Install a Network Policy Server (NPS) on a server on the perimeter network. Redirect authentication requests to a server on the internal network.

D.Install Microsoft Internet Information Services (IIS) on a server on the perimeter network. Configure IIS to redirect requests to the Online Responder on the internal network.

Answer: D

QUESTION 13

Your network contains two DHCP servers. The DHCP servers are named DHCP1 and DHCP2. The internal network contains 1,000 DHCP client computers that are located on a single subnet. A router separates the internal network from the Internet. The router has a single IP address on the internal interface. DHCP1 has the following scope information.

·Starting IP address: 172.16.0.1

·Ending IP address: 172.16.7.255

·Subnet mask: 255.255.240.0

You need to provide a faulttolerant DHCP infrastructure that supports the client computers on the internal network. In the event that a DHCP server fails, all client computers must be able to obtain a valid IP address.

How should you configure DHCP2?

A.Create a scope for the subnet 172.16.0.0/20. Configure the scope to use a starting IP address of 172.16.8.1 and an ending IP address of 172.16.15.254.

B.Create a scope for the subnet 172.16.0.0/21. Configure the scope to use a starting IP address of 172.16.0.1 and an ending IP address of 172.16.15.254.

C.Create a scope for the subnet 172.16.8.0/21. Configure the scope to use a starting IP address of 172.16.8.1 and an ending IP address of 172.16.10.254.

D.Create a scope for the subnet 172.17.0.0/16. Configure the scope to use a starting IP address of 172.17.0.1 and an ending IP address of 172.17.255.254.

Answer: A

QUESTION 14

Your company has a main office and three branch offices. The network consists of a single Active

Directory domain. Each office contains an Active Directory domain controller. You need to create a DNS infrastructure for the network that meets the following requirements:

·The DNS infrastructure must allow the client computers in each office to register DNS names within their respective offices.

·The client computers must be able to resolve names for hosts in all offices.

What should you do?

A.Create an Active Directoryintegrated zone at the main office site.

B.Create a standard primary zone at the main office site and at each branch office site.

C.Create a standard primary zone at the main office site. Create a secondary zone at each branch office site.

D.Create a standard primary zone at the main office site. Create an Active Directoryintegrated stub zone at each branch office site.

Answer: A

QUESTION 15

Your network consists of a single Active Directory domain. The network contains two Windows Server 2008 R2 computers named Server1 and Server2. The company has two identical print devices. You plan to deploy print services. You need to plan a print services infrastructure to meet the following requirements:

·Manage the print queue from a central location.

·Make the print services available, even if one of the print devices fails.

What should you include in your plan?

A.Install and share a printer on Server1. Enable printer pooling. 打印机池

B.Install the Remote Desktop Services server role on both servers. Configure Remote Desktop Connection Broker (RD Connection Broker).

C.Install and share a printer on Server1. Install and share a printer on Server2. Use Print Management to install the printers on the client computers.

D.Add Server1 and Server2 to a Network Load Balancing cluster. Install a printer on each node of the cluster. Answer: A

QUESTION 16

Your network contains two servers that run the Server Core installation of Windows Server 2008 R2. The two servers are part of a Network Load Balancing cluster.

The cluster hosts a Web site. Administrators use client computers that run Windows 7.

You need to recommend a strategy that allows the administrators to remotely manage the Network Load Balancing cluster. Your strategy must support automation.

What should you recommend?

A.On the servers, enable Windows Remote Management (WinRM).

B.On the servers, add the administrators to the Remote Desktop Users group.

C.On the Windows 7 client computers, enable Windows Remote Management (WinRM).

D.On the Windows 7 client computers, add the administrators to the Remote Desktop Users group.

Answer: A

QUESTION 17

Your company has a main office and a branch office. You plan to deploy a Readonly Domain Controller (RODC) in the branch office. You need to plan a strategy to manage the RODC. Your plan must meet the following requirements:

·Allow branch office support technicians to maintain drivers and disks on the RODC

·Prevent branch office support technicians from managing domain user accounts

What should you include in your plan?

A.Configure the RODC for Administrator Role Separation.

B.Configure the RODC to replicate the password for the branch office support technicians.

C.Set NTFS permissions on the Active Directory database to Read & Execute for the branch office support technicians.

D.Set NTFS permissions on the Active Directory database to Deny Full Control for the branch office support technicians.

Answer: A

QUESTION 18

Your network consists of a single Active Directory domain. The network contains five Windows Server

2008 R2 servers that host Web applications. You need to plan a remote management strategy to manage

the Web servers. Your plan must meet the following requirements:

稟llow Web developers to configure features on the Web sites

稰revent Web developers from having full administrative rights on the Web servers

What should you include in your plan?

A.Configure request filtering on each Web server.

B.Configure authorization rules for Web developers on each Web server.

C.Configure the security settings in Internet Explorer for all Web developers by using a Group Policy.

D.Add the Web developers to the Account Operators group in the domain.

Answer: B

QUESTION 19

Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2008 R2. The domain contains 200 Windows Server 2008 R2 servers. You need to plan a monitoring solution that meets the following requirements.

·Sends a notification by email to the administrator if an application error occurs on any of the servers

·Uses the minimum amount of administrative effort

What should you include in your plan?

A.On one server, create event subscriptions for each server. On the server, attach tasks to the application error events.

B.On one server, create an Event Trace Sessions Data Collector Set. On all servers, create a System Performance Data Collector Set.

C.On all servers, create event subscriptions for one server. On all servers, attach a task for the application error events.

D.On all servers, create a System Performance Data Collector Set. On one server, configure the report settings for the new Data Collector set.

Answer: A

QUESTION 20

Your network consists of a single Active Directory domain. The network includes a branch office named Branch1. Branch1 contains 50 member servers that run Windows Server 2008 R2. An organizational unit (OU) named Branch1Servers contains the computer objects for the servers in Branch1. A global group named Branch1admins contains the user accounts for the administrators. Administrators maintain all member servers in Branch1. You need to recommend a solution that allows the members of Branch1admins group to perform the following tasks on the Branch1 member servers.

·Stop and start services

·Change registry settings

What should you recommend?

A.Add the Branch1admins group to the Power Users local group on each server in Branch1.

B.Add the Branch1admins group to the Administrators local group on each server in Branch1.

C.Assign the Branch1admins group change permissions to the Branch1Servers OU and to all child objects.

D.Assign the Branch1admins group Full Control permissions on the Branch1Servers OU and to all child objects.

Answer: B

QUESTION 21

Your network consists of a single Active Directory domain. The network includes a branch office named Branch1. Branch1 contains a Readonly Domain Controller (RODC) named Server1. A global group named Branch1?admins contains the user accounts for administrators. Administrators manage the client computers and servers in Branch1. You need to recommend a solution for delegating control of Server1. Your solution must meet the following requirements:

·Allow the members of the Branch1admins group to administer Server1 including, change device drivers and install operating system updates by using Windows Update.

·Provide the Branch1admins group rights on Server1 only.

·Prevent Branch1admins group from modifying Active Directory objects.

What should you recommend?

A.Add the Branch1admins global group to the Server Operators builtin local group.

B.Add the members of the Branch1admins global group to the Administrators builtin local group of Server1.

C.Grant Full Control permission on the Server1 computer object in the domain to the Branch1admins group.

D.Move the Server1 computer object to a new organizational unit (OU) named Branch1servers. Grant Full Control permission on the Branch1servers OU to the Branch1admins group.

Answer: B

QUESTION 22

Your network consists of a single Active Directory forest. The forest functional level is Windows Server 2008 R2. The forest contains two domains named https://www.doczj.com/doc/5f16723957.html, and https://www.doczj.com/doc/5f16723957.html,. https://www.doczj.com/doc/5f16723957.html, contains a user named User1. https://www.doczj.com/doc/5f16723957.html, contains an organizational unit (OU) named Security.

You need to give User1 administrative rights so that he can manage Group Policies for the Security OU.

You want to achieve this goal while meeting the following requirements:

·User1 must be able to create and configure Group Policies in https://www.doczj.com/doc/5f16723957.html,.

·User1 must be able to link Group Policies to the Security OU.

·User1 must be granted the least administrative rights necessary to achieve the goal.

What should you do?

A.Add User1 to the Administrators group for https://www.doczj.com/doc/5f16723957.html,.

B.Add User1 to the Group Policy Creator Owners group in https://www.doczj.com/doc/5f16723957.html,. Modify the permissions on the Security OU.

C.Run the Delegation of Control Wizard on the Security OU. In the Group Policy Management Console, modify the permissions of the Group Policy Objects container in the https://www.doczj.com/doc/5f16723957.html, domain.

D.Run the Delegation of Control Wizard on https://www.doczj.com/doc/5f16723957.html,. In the Group Policy Management Console, modify the permissions of the Group Policy Objects container in the https://www.doczj.com/doc/5f16723957.html, domain.

Answer: C

QUESTION 23

Your network contains several branch offices. All servers run Windows Server 2008 R2. Each branch office contains a domain controller and a file server. The DHCP Server server role is installed on the branch office domain controllers. Each office has a branch office administrator.

You need to delegate the administration of DHCP to meet the following requirements:

·Allow branch office administrators to manage DHCP scopes for their own office

·Prevent the branch office administrators from managing DHCP scopes in other offices

·Minimize administrative effort

What should you do?

A.In the Active Directory domain, add the branch office administrators to the Server Operators builtin local group.

B.In the Active Directory domain, add the branch office administrators to the Network Configuration Operators builtin

local group.

C.In each branch office, migrate the DHCP Server server role to the file server. On each file server, add the branch office administrator to the DHCP Administrators local group.

D.In each branch office, migrate the DHCP Server server role to the file server. In the Active Directory domain, add the branch office administrators to the DHCP Administrators domain local group.

Answer: C

QUESTION 24

Your company has a single Active Directory domain. You have 30 database servers that run Windows Server 2008 R2.

The computer accounts for the database servers are stored in an organizational unit (OU) named Data. The user accounts for the database administrators are stored in an OU named Admin. The database administrators are members of a global group named D_Admins. You must allow the database administrators to perform administrative tasks on the database servers. You must prevent the database administrators from performing administrative tasks on other servers. What should you do?

A.Deploy a Group Policy to the Data OU.

B.Deploy a Group Policy to the Admin OU.

C.Add D_Admins to the Domain Admins global group.

D.Add D_Admins to the Server Operators builtin local group.

Answer: A

QUESTION 25

Your network consists of a single Active Directory forest that contains a root domain and two child domains. All servers run Windows Server 2008 R2. A corporate policy has the following requirements:

·All local guest accounts must be renamed and disabled.

·All local administrator accounts must be renamed.

You need to recommend a solution that meets the requirements of the corporate policy.

What should you recommend?

A.Implement a Group Policy object (GPO) for each domain.

B.Implement a Group Policy object (GPO) for the root domain.

C.Deploy Network Policy and Access Services (NPAS) on all domain controllers in each domain.

D.Deploy Active Directory Rights Management Services (AD RMS) on the root domain controllers.

Answer: A

QUESTION 26

Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2008 R2. All domain controllers run Windows Server 2008 R2.

A corporate policy requires that the users from the research department have higher levels of account and password security than other users in the domain. You need to recommend a solution that meets the requirements of the corporate policy. Your solution must minimize hardware and software costs.

What should you recommend?

A.Create a new Active Directory site. Deploy a Group Policy object (GPO) to the site.

B.Create a new Password Settings Object (PSO) for the research department's users.

C.Create a new organizational unit (OU) named Research in the existing domain. Deploy a Group Policy object (GPO) to the Research OU.

D.Create a new domain in the forest. Add the research department's user accounts to the new domain. Configure a new security policy in the new domain.

Answer: B

QUESTION 27

Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2008 R2. All servers run Windows Server 2008 R2. A corporate security policy requires complex passwords for user accounts that have administrator privileges. You need to design a strategy that meets the following requirements:

·Ensures that administrators use complex passwords

·Minimizes the number of servers required to support the solution

What should you include in your design?

A.Implement Network Access Protection (NAP).

B.Implement Active Directory Rights Management Services (AD RMS).

C.Create a new Password Settings Object (PSO) for administrator accounts.

D.Create a new child domain in the forest. Move all nonadministrator accounts to the new domain. Configure a complex password policy in the root domain.

Answer: C

QUESTION 28

Your network consists of a single Active Directory domain. The domain contains three organizational units (OUs) named Test, Application, and Database. You need to redesign the layout of the OUs to support the following requirements:

·Prevent Group Policy objects (GPOs) that are linked to the domain from applying to computers located in the Applications OU

·Minimize the number of GPOs

·Minimize the number of OUs

What should you include in your design?

A.Create a Starter GPO.

B.Create a Windows Management Instrumentation (WMI) filter.

C.Delegate permissions on the Application OU.

D.Configure block inheritance 阻止继承on the Application OU.

Answer: D

QUESTION 29

Your network consists of a single Active Directory domain. The relevant portion of the Active Directory domain is

configured as shown in the following diagram.

The Staff organizational unit (OU) contains all user accounts except for the managers' user accounts. The Managers OU contains the managers' user accounts and the following global groups:

·Sales

·Finance

·Engineering

You create a new Group Policy object (GPO) named GPO1, and then link it to the Employees OU.

Users from the Engineering global group report that they are unable to access the Run command on the Start menu. You discover that the GPO1 settings are causing the issue. You need to ensure that the users from the Engineering global group are able to access the Run command on the Start menu. What should you do?

A.Configure GPO1 to use the Enforce Policy option.

B.Configure Block Inheritance on the Managers OU.

C.Configure Group Policy filtering on GPO1 for the Engineering global group.

D.Create a new child OU named Engineering under the Employees OU. Move the Engineering global

group to the new Engineering child OU.

Answer: C

QUESTION 30

Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2.

You need to recommend a Group Policy deployment strategy. Your strategy must support the following requirements:

·Domainlevel Group Policy objects (GPOs) must not be overwritten by organizational unit (OU) level GPOs. ·OUlevel

GPOs must not apply to members of the Server Operators group.

What should you recommend?

A.Enable Block Inheritance for the domain, and then modify the permissions of all GPOs linked to OUs.

B.Enable Block Inheritance for the domain, and then enable Loopback Processing policy mode. Add the Server Operators group to the Restricted Groups list.

C.Set all domain level GPOs to Enforced, and then modify the permissions of the GPOs that are linked to OUs.

D.Set all domain level GPOs to Enforced, and then enable Loopback Processing policy mode. Add the Server Operators group to the Restricted Groups list.

Answer: C

QUESTION 31

Your network consists of three Active Directory forests. Forest trust relationships exist between all forests. Each

forest contains one domain. All domain controllers run Windows Server 2008 R2. Your company has three network administrators. Each network administrator manages a forest and the Group Policy objects (GPOs) within that forest.

You need to create standard GPOs that the network administrators in each forest will use. The GPOs must meet the following requirements:

·The GPOs must only contain settings for either user configurations or computer configurations.

·The number of GPOs must be minimized.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A.Export the new GPOs to .cab files. Ensure that the .cab files are available to the network administrator in each forest.

B.Create two new GPOs. Configure both GPOs to use the required user configurations and the required computer configurations.

C.Create two new GPOs. Configure one GPO to use the required user configuration. Configure the other GPO to use the required computer configuration.

D.Back up the Sysvol folder that is located on the domain controller where the new GPOs were created. Provide the backup to the network administrator in each forest.

Answer: AC

QUESTION 32

Your company has a branch office that contains a Windows Server 2008 R2 computer. The Windows Server 2008 R2 computer runs Windows Server Update Services (WSUS). The WSUS server is configured to store updates locally.

The company opens four new satellite offices. Each satellite office connects to the branch office by using a dedicated WAN link. Internet access is provided through the branch office.

You need to design a strategy for patch management that meets the following requirements:

·WSUS updates are approved independently for each satellite office.

·Internet traffic is minimized.

What should you include in your design?

A.In each satellite office, install a WSUS server. Configure each satellite office WSUS server as an autonomous server.

B.In each satellite office, install a WSUS server. Configure each satellite office WSUS server as a replica of the branch office WSUS server.

C.In each satellite office, install a WSUS server. Configure each satellite office WSUS server to use the branch office WSUS server as an upstream上游server.

D.For each satellite office, create organizational units (OUs). Create and link the Group Policy objects (GPOs) to the OUs. Configure different schedules to download updates from the branch office WSUS server to the client computers in each satellite office.

Answer: C

QUESTION 33

Your network contains several Windows Server 2008 R2 servers that run Windows Server Update Services (WSUS). The WSUS servers distribute updates to all computers on the internal network. Remote users connect from their personal computers to the internal network by using a splittunnel VPN connection.

You need to plan a strategy for patch management that deploys updates on the remote users' computers.

Your strategy must meet the following requirements:

·Minimize bandwidth use over the VPN connections

·Require updates to be approved on the WSUS servers before they are installed on the client computers

What should you include in your plan?

A.Create a Group Policy object (GPO) to perform clientside targeting.

B.Create a computer group for the remote users' computers. Configure the remote users' computers to use the internal WSUS server.

C.Create a custom connection by using the Connection Manager Administration Kit (CMAK). Deploy the custom connection to all of the remote users' computers.

D.Deploy an additional WSUS server. Configure the remote users' computers to use the additional WSUS server. Configure the additional WSUS server to leave the updates on the Microsoft Update Web site.

Answer: D

QUESTION 34

Your company has a branch office that contains a Windows Server 2008 R2 server. The server runs Windows Server Update Services (WSUS). The company opens four new satellite offices. Each satellite office connects to the branch office by using a dedicated WAN link. You need to design a strategy for patch management that meets the following requirements:

·WSUS updates are approved from a central location.

·WAN traffic is minimized between the branch office and the satellite offices.

What should you include in your design?

A.In each satellite office, install a WSUS server. Configure each satellite office WSUS server as a replica 副本of the branch office WSUS server.

B.In each satellite office, install a WSUS server. Configure each satellite office WSUS server as an autonomous 自治server that synchronizes to the branch office WSUS server.

C.On the branch office WSUS server, create a computer group for each satellite office. Add the client computers in each satellite office to their respective computer groups.

D.For each satellite office, create an organizational unit (OU). Create and link a Group Policy object (GPO) to each OU. Configure different schedules to download updates from the branch office WSUS server to the client computers in each satellite office.

Answer: A

QUESTION 35

You need to design a Windows Server Update Services (WSUS) infrastructure that meets the following requirements:

·The updates must be distributed from a central location.

·All computers must continue to receive updates in the event that a server fails.

What should you include in your design?

A.Configure two WSUS servers in a Microsoft SQL Server 2008 failover cluster. Configure each WSUS server to use a local database.

B.Configure a single WSUS server to use multiple downstream servers. Configure each WSUS server to use a RAID 1 mirror and a local database.

C.Configure a single WSUS server to use multiple downstream servers. Configure each WSUS server to use a RAID 5 array and a local database.

D.Configure a Microsoft SQL Server 2008 failover cluster. Configure two WSUS servers in a Network Load Balancing cluster. Configure WSUS to use the remote SQL Server 2008 database instance.

Answer: D

QUESTION 36

Your network consists of a single Active Directory forest. The sales department in your company has 600 Windows Server 2008 R2 servers. You need to recommend a solution to monitor the performance of the 600 servers. Your solution must meet the following requirements:

·Generate alerts when the average processor usage is higher than 90 percent for 20 minutes.

·Automatically adjust the processor monitoring threshold to allow for temporary changes in the workload.

What should you recommend?

A.Install Windows System Resource Manager (WSRM) on each server.

B.Deploy Microsoft System Center Operations Manager (OpsMgr).

C.Deploy Microsoft System Center Configuration Manager (SysMgr).

D.Configure Reliability and Performance Monitor on each server.

Answer: B

QUESTION 37

Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2. A server named Server1 has the Remote Desktop Services server role installed. You notice that several users consume more than 30 percent of the CPU resources throughout the day. You need to prevent users from consuming more than 15 percent of the CPU resources. Administrators must not be limited by the amount of CPU resources that they can consume.

What should you do?

A.Implement Windows System Resource Manager (WSRM), and configure user policies.

B.Implement Windows System Resource Manager (WSRM), and configure session policies.

C.Configure Performance Monitor, and create a userdefined Data Collector Set.

D.Configure Performance Monitor, and create an Event Trace Session Data Collector Set.

Answer: A

QUESTION 38

Your network contains a standalone root certification authority (CA). You have a server named Server1 that runs Windows Server 2008 R2. You issue a server certificate to Server1. You deploy Secure Socket Tunneling Protocol (SSTP) on Server1.

You need to recommend a solution that allows external partner computers to access internal network resources by using SSTP.

What should you recommend?

A.Enable Network Access Protection (NAP) on the network.

B.Deploy the Root CA certificate to the external computers.

C.Implement the Remote Desktop Connection Broker role service.

D.Configure the firewall to allow inbound traffic on TCP Port 1723.

Answer: B

QUESTION 39

Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2. You need to plan an auditing strategy that meets the following requirements:

·Audits all changes to Active Directory Domain Services (AD?DS)

·Stores all auditing data in a central location

What should you include in your plan?

A.Configure an audit policy for the domain. Configure Event Forwarding.

B.Configure an audit policy for the domain controllers. Configure Data Collector Sets.

C.Implement Windows Server Resource Manager (WSRM) in managing mode.

D.Implement Windows Server Resource Manager (WSRM) in accounting mode.

Answer: A

QUESTION 40

Your network contains a single Active Directory domain. All domain controllers run Windows Server 2008 R2. There are 1,000 client computers that run Windows 7 and that are connected to managed switches.

You need to recommend a strategy for network access that meets the following requirements:

·Users are unable to bypass network access restrictions.

·Only client computers that have uptodate service packs installed can access the network.

·Only client computers that have uptodate antimalware software installed can access the network. What should you recommend?

A.Implement Network Access Protection (NAP) that uses DHCP enforcement.

B.Implement Network Access Protection (NAP) that uses 802.1x enforcement.

C.Implement a Network Policy Server (NPS), and enable IPsec on the domain controllers.

D.Implement a Network Policy Server (NPS), and enable Remote Authentication DialIn User Service (RADIUS) authentication on the managed switches.

Answer: B

QUESTION 41

Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2. The network contains 100 servers and 5,000 client computers. The client computers run either Windows XP Service Pack 1 or Windows 7.

You need to plan a VPN solution that meets the following requirements:

·Stores VPN passwords as encrypted text

·Supports Suite B cryptographic algorithms

·Supports automatic enrollment of certificates

·Supports client computers that are configured as members of a workgroup

What should you include in your plan?

A.Upgrade the client computers to Windows XP Service Pack 3. Implement a standalone certification authority (CA). Implement an IPsec VPN that uses certificatebased authentication.

B.Upgrade the client computers to Windows XP Service Pack 3. Implement an enterprise certification authority (CA) that is based on Windows Server?2008 R2. Implement an IPsec VPN that uses Kerberos authentication.

C.Upgrade the client computers to Windows 7. Implement an enterprise certification authority (CA) that is based on Windows Server 2008 R2. Implement an IPsec VPN that uses preshared keys.

D.Upgrade the client computers to Windows 7. Implement an enterprise certification authority (CA) that is based on Windows Server 2008 R2. Implement an IPsec VPN that uses certificatebased authentication.

Answer: D

QUESTION 42

Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2. All servers run Windows Server 2008 R2. All client computers run Windows 7. You need to generate a monthly report on the status of software updates for the client computers. Your solution must meet the following requirements:

·Display all of the operating system updates that installed successfully

·Display all of the Microsoft application updates that installed successfully

·Display all of the operating system updates that failed to install

·Display all of the Microsoft application updates that failed to install

·Minimize administrative effort

·Minimize costs

What should you do?

A.Install Microsoft System Center Essentials (Essentials) 2007. Deploy management agents on all client computers.

B.Install Microsoft System Center Configuration Manager (SysMgr) 2007. Deploy management agents on all client computers.

C.Install Windows Server Update Services (WSUS) 3.0 SP2. Configure Windows Update by using a Group Policy object (GPO).

D.Deploy Microsoft Baseline Security Analyzer (MBSA) 2.1 on the client computers. Run MBSA on each client computer, and save the report to a shared folder on the network.

Answer: C

QUESTION 43

Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2. Your company and an external partner plan to collaborate on a project. The external partner has an Active Directory domain that contains Windows Server 2008 R2 domain controllers. You need to design a collaboration solution that meets the following requirements:

·Allows users to prevent sensitive documents from being forwarded to untrusted recipients or from being printed. ·Allows users in the external partner organization to access the protected content to which they have been granted rights.

·Sends all interorganizational traffic over port 443.

·Minimizes the administrative effort required to manage the external users.

What should you include in your design?

A.Establish a federated trust between your company and the external partner. Deploy a Windows Server 2008 R2 server that has Microsoft SharePoint Foundation 2010 installed.

B.Establish a federated trust between your company and the external partner. Deploy a Windows Server 2008 R2 server that runs Microsoft SharePoint 2010在中间and that has the Active Directory Rights Management Services (AD RMS) role installed.

C.Establish an external forest trust between your company and the external partner. Deploy a Windows Server 2008 R2 server that has the Active Directory Certificate Services server role installed. Implement Encrypting File System (EFS).

D.Establish an external forest trust between your company and the external partner. Deploy a Windows Server 2008 R2 server that has the Active Directory Rights Management Service (AD RMS) role installed and Microsoft

SharePoint Foundation 2010 installed.

Answer: B

QUESTION 44

Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2. There are five Windows Server 2003 SP2 servers that have the Terminal Server component installed. A firewall server runs Microsoft Internet Security and Acceleration (ISA) Server 2006. You need to create a remote access strategy for the Remote Desktop Services servers that meets the following requirements:

·Restricts access to specific users

·Minimizes the number of open ports on the firewall

·Encrypts all remote connections to the Remote Desktop Services servers

What should you do?

A.Implement SSL bridging on the ISA Server. Require authentication on all inbound connections to the ISA Server.

B.Implement port forwarding on the ISA Server. Require authentication on all inbound connections to the ISA Server.

C.Upgrade a Windows Server 2003 SP2 server to Windows Server 2008 R2. On the Windows Server 2008 R2 server, implement the Remote Desktop Gateway (RD Gateway) role service, and configure a Remote Desktop resource authorization policy (RD RAP).

D.Upgrade a Windows Server 2003 SP2 server to Windows Server 2008 R2. On the Windows Server 2008 R2 server, implement the Remote Desktop Gateway (RD Gateway) role service, and configure a Remote Desktop connection authorization policy (RD CAP).

Answer: D

QUESTION 45

Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2. There are five Windows Server 2003 SP2 servers that have the Terminal Server component installed. A firewall server runs Microsoft Internet Security and Acceleration (ISA) Server 2006.

You plan to give remote users access to the Remote Desktop Services servers.

You need to create a remote access strategy for the Remote Desktop Services servers that meets the following requirements:

·Restricts access to specific Remote Desktop Services servers

·Encrypts all connections to the Remote Desktop Services servers

·Minimizes the number of open ports on the firewall server

What should you do?

A.Implement SSL bridging on the ISA Server. Require authentication on all inbound connections to the ISA Server.

B.Implement port forwarding on the ISA Server. Require authentication on all inbound connections to the ISA Server.

C.Upgrade a Windows Server 2003 SP2 server to Windows Server 2008 R2. On the Windows Server 2008 R2 server, implement the Remote Desktop Gateway (RD Gateway) role service, and configure a Remote Desktop resource authorization policy (RD RAP).

D.Upgrade a Windows Server 2003 SP2 server to Windows Server 2008 R2. On the Windows Server 2008 R2 server, implement the Remote Desktop Gateway (RD Gateway) role service, and configure a Remote Desktop connection authorization policy (RD CAP).

Answer: C

QUESTION 46

Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2. There are five servers that run Windows Server 2003 SP2. The Windows Server 2003 SP2 servers have the Terminal Server component installed. A firewall server runs Microsoft Internet Security and Acceleration (ISA) Server 2006. All client computers run Windows 7.

You plan to give remote users access to the Remote Desktop Services servers. You need to create a remote access strategy for the Remote Desktop Services servers that meets the following requirements:

·Minimizes the number of open ports on the firewall server

·Encrypts all remote connections to the Remote Desktop Services servers

·Prevents network access to client computers that have Windows Firewall disabled

What should you do?

A.Implement port forwarding on the ISA Server. Implement Network Access Quarantine Control on the ISA Server.

B.Upgrade a Windows Server 2003 SP2 server to Windows Server 2008 R2. On the Windows Server 2008 R2 server, implement the Remote Desktop Gateway (RD Gateway) role service, and implement Network Access Protection (NAP). 长的

C.Upgrade a Windows Server 2003 SP2 server to Windows Server 2008 R2. On the Windows Server 2008 R2 server, implement the Remote Desktop Gateway (RD Gateway) role service, and configure a Remote Desktop connection authorization policy (RD?CAP).

D.Upgrade a Windows Server 2003 SP2 server to Windows Server 2008 R2. On the Windows Server 2008 R2 server, implement the Remote Desktop Gateway (RD Gateway) role service, and configure a Remote Desktop resource authorization policy (RD RAP).

Answer: B

QUESTION 47

Your network consists of a single Active Directory domain. Your network contains 10 servers and 500 client computers. All domain controllers run Windows Server 2008 R2. A Windows Server 2008 R2 server has Remote Desktop Services installed. All client computers run Windows XP Service Pack 3. You plan to deploy a new lineofbusiness application. The application requires desktop themes to be enabled.

You need to recommend a deployment strategy that meets the following requirements:

·Only authorized users must be allowed to access the application.

·Authorized users must be able to access the application from any client computer.

·Your strategy must minimize changes to the client computers.

·Your strategy must minimize software costs.

What should you recomme nd?

A.Migrate all client computers to Windows 7. Deploy the application to all client computers by using a Group Policy object (GPO).

B.Migrate all client computers to Windows 7. Deploy the application to the authorized users by using a Group Policy object (GPO).

C.Deploy the Remote Desktop Connection (RDC) 7.0 software to the client computers. Install the application on the Remote Desktop Services server. Implement Remote Desktop Connection Broker (RD Connection Broker).

D.Deploy the Remote Desktop Connection (RDC) 7.0 software to the client computers. Enable the Desktop Experience feature on the Remote Desktop Services server. Install the application on the Remote Desktop Services server.

Answer: D

QUESTION 48

Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2. All client computers run Windows 7. All user accounts are stored in an organizational unit (OU) named Staff. All client computer accounts are stored in an OU named Clients. You plan to deploy a new application.

You need to ensure that the application deployment meets the following requirements:

·Users must access the application from an icon on the Start menu.

·The application must be available to remote users when they are offline.

What should you do?

A.Publish the application to users in the Staff OU.

B.Publish the application to users in the Clients OU.

C.Assign the application to computers in the Staff OU.

D.Assign the application to computers in the Clients OU.

Answer: D

QUESTION 49

Your network contains an Active Directory domain. The domain contains a Remote Desktop Services server that runs Windows Server 2008 R2. All client computers run Windows 7. You need to deploy a new lineofbusiness application. The deployment must meet the following requirements:

·Users must have access to the application from the company portal.

·Users must always have access to the latest version of the application.

·You must minimize the number of applications installed on the client computers.

What should you do?

A.Publish the application to the users by using a Group Policy object (GPO).

B.Publish the application as a RemoteApp. Enable Remote Desktop Web Access (RD Web Access). 3 -- 3

C.Assign the application to the client computers by using a Group Policy object (GPO).

D.Deploy the application by using Microsoft System Center Configuration Manager (SCCM) 2007 R2.

Answer: B

QUESTION 50

Your network consists of a single Active Directory domain. The domain contains a server that runs Windows Server 2008 R2 and that has the Remote Desktop Services server role installed. The server has six custom applications installed. The custom applications are configured as RemoteApps. You notice that when a user runs one of the applications, other users report that the server seems slow and that some applications become unresponsive. You need to ensure that active user sessions receive equal access to system resources.

What should you do?

A.Implement Remote Desktop Web Access.

B.Implement Remote Desktop Connection Broker.

C.Configure Performance Monitor.

D.Implement Windows System Resource Manager.

Answer: D

QUESTION 51

线性代数英文单词

线性代数英语词汇大集合 ========================================================================= A adjont(adjugate) of matrix A A 的伴随矩阵 augmented matrix A 的增广矩阵 B block diagonal matrix 块对角矩阵 block matrix 块矩阵 basic solution set 基础解系 C Cauchy-Schwarz inequality 柯西 - 许瓦兹不等式 characteristic equation 特征方程 characteristic polynomial 特征多项式 coffcient matrix 系数矩阵 cofactor 代数余子式 cofactor expansion 代数余子式展开 column vector 列向量 commuting matrices 交换矩阵 consistent linear system 相容线性方程组 Cramer's rule 克莱姆法则 Cross- product term 交叉项 D Determinant 行列式 Diagonal entries 对角元素 Diagonal matrix 对角矩阵 Dimension of a vector space V 向量空间 V 的维数 E echelon matrix 梯形矩阵 eigenspace 特征空间 eigenvalue 特征值 eigenvector 特征向量

eigenvector basis 特征向量的基 elementary matrix 初等矩阵 elementary row operations 行初等变换 F full rank 满秩 fundermental set of solution 基础解系 G grneral solution 通解 Gram-Schmidt process 施密特正交化过程 H homogeneous linear equations 齐次线性方程组I identity matrix 单位矩阵 inconsistent linear system 不相容线性方程组indefinite matrix 不定矩阵 indefinit quatratic form 不定二次型 infinite-dimensional space 无限维空间 inner product 内积 inverse of matrix A 逆矩阵 J K L linear combination 线性组合 linearly dependent 线性相关 linearly independent 线性无关 linear transformation 线性变换 lower triangular matrix 下三角形矩阵 M main diagonal of matrix A 矩阵的主对角matrix 矩阵

流体力学中英文对照外文翻译文献

中英文对照外文翻译(文档含英文原文和中文翻译)

14选择的材料取决于于高流动速度 降解或材料由于疲劳,腐蚀,磨损和气蚀故障糜烂一次又一次导致泵运营商成本高昂的问题。这可能通过仔细选择材料的性能以避免在大多数情况下发生。一两个原因便可能导致错误的材料选择:(1)泵输送的腐蚀性液体的性质没有清楚地指定(或未知),或(2),由于成本的原因(竞争压力),使用最便宜的材料。 泵部件的疲劳,磨损,空化攻击的严重性和侵蚀腐蚀与流速以指数方式增加,但应用程序各种材料的限制,不容易确定。它们依赖于流速度以及对介质的腐蚀性泵送和浓度夹带的固体颗粒,如果有的话。另外,交变应力诱导通过压力脉动和转子/定子相互作用力(RSI)真的不能进行量化。这就是为什么厚度的叶片,整流罩和叶片通常从经验和工程判断选择。 材料的本讨论集中在流之间的相互作用现象和物质的行为。为此,在某些背景信息腐蚀和经常使用的材料,被认为是必要的,但是一个综合指南材料的选择显然是超出了本文的范围。在这一章中方法开发出促进系统和一致方法选择材料和分析材料的问题领域。四个标准有关,用于选择材料暴露于高流动速度: 1.疲劳强度(通常在腐蚀环境),由于高的速度在泵本身与高压脉动,转子/定子的相互作用力和交变应力。 2.腐蚀诱导高的速度,特别是侵蚀腐蚀。 3.气蚀,由于已广泛在章讨论。 4.磨耗金属损失造成的流体夹带的固体颗粒。 磨损和汽蚀主要是机械磨损机制,它可以在次,被腐蚀的钢筋。与此相反,腐蚀是一种化学金属,泵送的介质,氧和化学试剂之间的反应。该反应始终存在- 即使它是几乎察觉。最后,该叶轮尖端速度可以通过液压力或振动和噪声的限制。 14.1叶轮和扩散的疲劳性骨折 可避免的叶轮叶片,整流罩或扩散器叶片的疲劳断裂施加领域的状态;它们很少观察到。在高负荷的泵,无视基本设计规则或生产应用不足的医疗服务时,这种类型的伤害仍然是有时会遇到。的主要原因在静脉或罩骨折包括: ?过小的距离(间隙B或比D3*= D3/ D2)叶轮叶片之间扩散器叶片(表10.2)。 ?不足寿衣厚度。 ?不足质量:叶片和护罩之间的圆角半径缺失或过于引起的小,铸造缺陷,脆性材料(韧性不足)热处理不足。 ?可能地,过度的压力脉动引起的泵或系统,第一章。10.3。 ?用液压或声叶轮的固有模式之间共振激发。也可能有之间的一个流体- 结构交互叶轮的侧板,并在叶轮侧壁间隙流动.. 转子/定子的互动和压力脉动章中讨论。10产生交替在叶轮叶片的压力和所述整流罩以及在扩散器叶片。这些应力的准确的分析几乎是不可能的(甚至虽然各组分能很好通过有限元程序进行分析),因为叶轮由不稳定压力分布的水力负荷不能定义。它不仅取决于流在叶轮,集电极和侧壁的差距,同时也对声学现象,并可能在脉动系统(也指章。10.3)。为了开发一致的实证过程评估装载叶轮和扩散器,用于选择叶片和护罩厚度或对所述的损伤的分析中,可以使用下一个均匀的负荷的简单梁的模型作为起点。因此,封闭的叶轮或扩散器的叶片是通过夹紧在两端的梁建模。开式叶轮或扩散器的描述由光束夹紧在一端,但游离在其他。根据表14.1和14.2的计算是基于以下assumptions1: 1.考虑叶片的最后部分中,在所述叶轮出口处的束夹在两者的宽度为X =5×e和跨度L = B2(E =标称叶片端厚度没有可能配置文件)。如果刀片是异形,平均叶片厚度青霉用于确

(完整版)流体力学试题及答案4

考试试卷(A B 卷) 学年第 学期 课程名称:流体力学 一、判断题(20分) 1. 流体质点只有质量没有大小。(F ) 2. 温度升高液体的表面张力系数增大。(F ) 3. 液滴内的压强比大气压小。( F ) 4. 声音传播过程是一个等熵过程。(T ) 5. 马赫线是超音速流动中被扰动和未扰动区域的分界线。(T ) 6. 一般情况下当马赫数小于2/3时可以忽略气体的压缩性(F ) 7. 超音速气流在收缩管道中作加速运动。(F ) 8. 定常流动中,流体运动的加速度为零。(F ) 9. 气体的粘性随温度的升高而增大。(T ) 10. 牛顿流体的粘性切应力与速度梯度,即角变形速率成正比。 (T ) 11. 理想流体定常流动,流线与等势线重合。 (F ) 12. 应用总流伯努利方程解题时,两个断面间一定是缓变流,方程 才成立。(F ) 13. 雷诺数是表征重力与惯性力的比值。 (F ) 14. 静止的流体中任意一点的各个方向的压强值均相等。(T ) 15. 大气层中的压强与密度、温度的变化有关而且受季节、气候等 因素的影响。(T ) 16. 压力体的体积表示一个数学积分,压力体内一定有流体。 (F ) 17. 不可压缩流体的有旋流动由于存在速度势和流函数,故又称为位势流动。(F ) 18. 如果流场中若干流体微团无绕自身轴线旋转运动,刚称为无旋流动。(F ) 19. 如果任一条封闭曲线上的速度环量皆为零,则此区域内的流动必为无旋流动。(T ) 20. 不可压缩流体在位势流场中,任意曲线上的速度环量等于曲线两端点上速度势函数值之差,而与曲线形状无关。(T ) 二、填空题(10分) 1. 在欧拉坐标系中,流体的加速度包括时变加速度和 位变加速度 两部分,如果流场中时变加速度为零,则称流动为 定常流动 ,否则流动称为 非定常流动 。 2. 雷诺实验揭示了流体流动存在层流和 紊流 两种流态,并可用 雷诺数来判别流态,管道流动的临界雷诺数为 2320 。 3. 已知三维流场的速度分布为:0,4,2==+=w x v t y u ,试求t=0时刻,经过点(1,1)的流线方程122 2=-y x ;点(1,1)处的加速度为i ρ89+。 4. 平面流动速度分布为:2 2y ax u -=,by xy v --=,如果流体不可压缩,试求a= 0.5 ;b= 0 。 5. 子弹在15摄氏度的大气中飞行,如果子弹头部的马赫角为45度,子弹的飞行速度为 481m/s 。

内科学试题库及答案(一)

内科学试题库及答案(一) 1.垂体危象时,下列何种情况最为多见 A.低钾性麻痹 B.低血糖性昏迷 C.谵妄 D.脑梗死 E.高钠高渗性昏迷 正确答案:B 2.结核性腹膜炎治疗中最重要的是 A.穿刺抽腹水 B.加强营养支持疗法 C.手术治疗肠梗阻、肠穿孔 D.加用糖皮质激素 E.联合足量全程的抗结核治疗 正确答案:E 3.类风湿性关节炎中,最先受累的关节组织是 A.骨组织 B.软骨组织 C.滑膜组织 D.韧带 E.关节囊 正确答案:C

4.慢性浅表性胃炎的临床表现哪项是错误的 A.可以引起恶性贫血 B.有时症状酷似消化性溃疡 C.消化性溃疡的发生率增高 D.胃酸偏低 E.易出现嗳气、反酸、腹胀等症状 正确答案:A 5.肾盂肾炎最主要的治疗措施是 A.多饮水或输液 B.卧床休息 C.应用糖皮质激素 D.应用抗生素 E.解痉止痛 正确答案:D 6. Budd-Chiari综合征时肝肿大是由于 A.肝淤血 B.代谢异常 C.肿瘤 D.血液病 E.中毒 正确答案:A 7. 哪种情况可引起全身淋巴结肿大 A.急性咽炎 B.慢性鼻炎

C.再生障碍性贫血 D.链霉素过敏 E.足癣合并感染 正确答案:D 8. 皮下出血面积的直径多大称为紫癜 A.<2mm B.2~3mm C.3~5mm D.>5mm E.以上均可 正确答案:C 9. 引起出血性疾病较常见的因素是 A.血管外因素 B.凝血因子缺乏 C.肝素或香豆类药物 D.抗凝血物质活性增加 E.血小板因素 正确答案:E 10. 轻度肿大的脾脏在仰卧位时触不到,医生可用双手触诊,病人应取哪种体位 A.右侧卧位,右下肢伸直,左下肢屈曲 B.右侧卧位,右下肢屈曲,左下肢伸直

流体力学试题及答案

全国2015年4月高等教育自学考试 --工程流体力学试题 一、单项选择题(每小题1分,共20分)在每小题列出的四个选项中只有一个选项是符合题目要求的,请将正确选项前的字母填在题后的括号内。 1.若流体的密度仅随( )变化而变化,则该流体称为正压性流体。 A.质量 B.体积 C.温度 D.压强 2.亚声速流动,是指马赫数( )时的流动。 A.等于1 B.等于临界马赫数 C.大于1 D.小于1 3.气体温度增加,气体粘度( ) A.增加 B.减小 C.不变 D.增加或减小 4.混合气体的密度可按各种气体( )的百分数来计算。 A.总体积 B.总质量 C.总比容 D.总压强 5.某单位购买了一台提升汽车的油压升降机(如图一所示),原设计操纵方法是:从B管进高压油,A管排油时平台上升(图一的左图);从A管进高压油,B管排油时平台下降。在安装现场工人不了解原设计意图,将A、B两管联在一起成为C管(图一的右图)。请你判断单靠一个C管通入高压油或排油,能操纵油压机升降吗?你的判断:( ) A.可以 B.不能动作 C.能升不能降 D.能降不能升 6.在一个储水箱的侧面上、下安装有两只水银U形管测压计(如图二),当箱顶部压强p0=1个大气压时,两测压计水银柱高之差△h=h1-h2=760mm(Hg),如果顶部再压入一部分空气,使p0=2个大气压时。则△h应为( )

C.△h=760mm(Hg) D.△h=1520mm(Hg) 7.流体流动时,流场各空间点的参数不随时间变化,仅随空间位置而变,这种流动称为( ) A.定常流 B.非定常流 C.非均匀流 D.均匀流 8.流体在流动时,根据流体微团( )来判断流动是有旋流动还是无旋流动。 A.运动轨迹是水平的 B.运动轨迹是曲线 C.运动轨迹是直线 D.是否绕自身轴旋转 9.在同一瞬时,流线上各个流体质点的速度方向总是在该点与此线( ) A.重合 B.相交 C.相切 D.平行 10.图示三个油动机的油缸的内径D相等,油压P也相等,而三缸所配的活塞结构不同,三个油动机的出力F1,F2,F3的大小关系是(忽略活塞重量)( ) A.F1=F2=F3 B.F1>F2>F3 C.F1F2 11.三个容积完全相等的容器,联接如图示,先将阀门a,b关闭,阀门c开启。压强计p指示为0。将容器I充入压缩空气,绝对压强为300KPa,容器Ⅲ抽成真空度为30KPa。先关闭阀门c,再开启阀门a和b。这时,压强计p 的读数应该是(设当地大气压是100KPa) A.56.7KPa B.76.7KPa C.90.0KPa D.110.0Kpa

线性代数introduction to vectors

An introduction to vectors Definition of a vector A vector is an object that has both a magnitude and a direction. Geometrically, we can picture a vector as a directed line segment, whose length is the magnitude of the vector and with an arrow indicating the direction. The direction of the vector is from its tail to its head. Two vectors are the same if they have the same magnitude and direction. This means that if we take a vector and translate it to a new position (without rotating it), then the vector we obtain at the end of this process is the same vector we had in the beginning. Two examples of vectors are those that represent force and velocity. Both force and velocity are in a particular direction. The magnitude of the vector would indicate the strength of the force or the speed associated with the velocity. We denote vectors using boldface as in a or b. Especially when writing by hand where one cannot easily write in boldface, people will sometimes denote vectors using arrows as in a or b, or they use other markings. We won't need to use arrows here. We denote the magnitude of the vector a by ∥a∥. When we want to refer to a number and stress that it is not a vector, we can call the number a scalar. We will denote scalars with italics, as in a or b . You can explore the concept of the magnitude and direction of a vector using the below applet. Note that moving the vector around doesn't change the vector, as the position of the vector doesn't affect the magnitude or the direction. But if you stretch or turn the vector by moving just its head or its tail, the magnitude or direction will change. (This applet also shows the coordinates of the vector, which you can read about in another page.) The magnitude and direction of a vector. The blue arrow represents a vector a . The two defining properties of a vector, magnitude and direction, are illustrated by a red bar and a green arrow, respectively. The length of the red bar is the magnitude ∥a∥ of the vector a. The green arrow always has length one, but its direction is the direction of the vector a.

流体力学中英文术语

Index 翻译(Fluid Mechanics) Absolute pressure,绝对压力(压强)Absolute temperature scales, 绝对温标Absolute viscosity, 绝对粘度Acceleration加速度centripetal, 向心的convective, 对流的Coriolis, 科氏的 field of a fluid, 流场 force and,作用力与……local, 局部的 Uniform linear, 均一线性的Acceleration field加速度场Ackeret theory, 阿克莱特定理Active flow control, 主动流动控制Actuator disk, 促动盘 Added mass, 附加质量Adiabatic flow绝热流 with friction,考虑摩擦的isentropic,等熵的 air, 气体 with area changes, 伴有空间转换Bemoullii’s equation and, 伯努利方程Mach number relations,马赫数关系式,pressure and density relations, 压力-速度关系式sonic point,critical values, 音速点,临界值,stagnation enthalpy, 滞止焓Adiabatic processes, 绝热过程Adiabatic relations, 绝热关系 Adverse pressure gradient, 逆压力梯度 Aerodynamic forces, on road vehicles, 交通工具,空气动力 Aerodynamics, 空气动力学 Aeronautics, new trends in, 航空学,新趋势 Air空气 testing/modeling in, 对……实验/建模 useful numbers for, 关于……的有用数字 Airbus Industrie, 空中客车产业 Aircraft航行器 airfoils机翼 new designs, 新型设计 Airfoils, 翼型 aspect ratio (AR), 展弦比 cambered, 弧形的 drag coefficient of , 阻力系数 early, 早期的 Kline-Fogleman, 克莱恩-佛莱曼 lift coefficient, 升力系数 NACA, (美国) 国家航空咨询委员会separation bubble, 分离泡 stalls and, 失速 stall speed, 失速速度 starting vortex, 起动涡 stopping vortex, 终止涡 Airfoil theory, 翼型理论 flat-plate vortex sheet theory, 平板面涡理论 Kutta condition, 库塔条件 Kutta-Joukowski theorem, 库塔-儒科夫斯基定理 1

内科学题库+答案

呼吸系统疾病 肺炎 一、单项选择题 1.下列对肺炎的描述哪个是错误的 A.肺炎是指由细菌感染引起的终末气道,肺泡和肺间质炎症。 B.大叶性肺炎亦称肺泡性肺炎。 C.感染性肺炎的发生主要决定于宿主和病原体的因素。 D.肺炎在X线胸部检查时有明显的肺实质炎性浸润。 E.HAP常发生于高龄,有心肺基础疾病,免疫力低下的人群。 2.经口腔痰定量培养分离的细菌在下列那种情况下可以认为是肺部感染的致病菌: A.细菌浓度>104cfu/ml B.连续两次以上分离到相同细菌,浓度≥104cfu/ml C.细菌浓度<104cfu/ml D.细菌浓度≥107cfu/ml E.细菌浓度105cfu/ml~106cfu/ml 3.感染性肺炎在胸部X片上出现空洞改变,可能性最小的诊断是 A.金葡菌肺炎 B.真菌性肺炎 C.肺炎链球菌肺炎 D.G—杆菌肺炎 E.厌氧菌性肺炎 4.18岁男性患者,既往健康,受凉后突然发热,寒战,胸痛,体检:T 39.5℃,P110次/分,R28次/分,右上肺有管样呼吸音。X片示:右上肺大片密变阴影。WBC 26.0×109/L,N90%,最恰当的诊断为: A.右上肺干酪性肺炎 B.病毒性肺炎 C.支原体肺炎 D.肺炎链球菌肺炎 E.急性肺栓塞 5.肺炎链球菌肺炎经青霉素及对症支持治疗后,其预后最可能是: A.完全吸收,不留痕迹 B.肺部空洞形成 C.肺部留下瘢痕条索影 D.支气管扩张 E.脓胸 6.男性患者,45岁,因高热,咯大量臭脓痰伴咯血住院。X线胸片诊断:右肺下叶背段肺脓肿,先后应用青霉素、甲硝唑等多种抗生素治疗七个月仍有反复咯痰,咯血,咯血量最大可达500ml,下一步最佳的治疗方案是: A.痰及体位引流 B.痰培养+药敏,选用敏感抗生素 C.抗感染同时加强止血剂应用 D.外科手术治疗 E.气管内滴入药物治疗 7.急性吸入性肺脓肿最典型的临床表现是:

流体力学习题及答案

流体力学与叶栅理论 课程考试试题 一、 选择题(每小题1分,共10分) 1、在括号内填上“表面力”或“质量力”: 摩擦力( ); 重力( ); 离心力( ); 浮力( ); 压力( )。 2、判断下列叙述是否正确(对者画√,错者画╳): (a) 基准面可以任意选取。( ) (b) 流体在水平圆管内流动,如果流量增大一倍而其它条件不变的话,沿程阻力也将增大一倍。( ) (c) 因为并联管路中各并联支路的水力损失相等,所以其能量损失也一定相等。( ) (d) 定常流动时,流线与迹线重合。( ) (e) 沿程阻力系数λ的大小只取决于流体的流动状态。( ) 二、 回答下列各题(1—2题每题5分,3题10分,共20分) 1、什么是流体的连续介质模型?它在流体力学中有何作用? 2、用工程单位制表示流体的速度、管径、运动粘性系数时,管流的雷诺数410Re ,问采用国际单位制时,该条件下的雷诺数是多少?为什么? 3、常见的流量的测量方法有哪些?各有何特点? 三、计算题(70分) 1、如图所示,一油缸及其中滑动栓塞,尺寸D =120.2mm ,d =119.8mm ,L =160mm ,

间隙内充满μ=·S的润滑油,若施加活塞以F=10N的拉力,试问活塞匀速运动时的速度是多少?(10分) 题1图 2、如图所示一盛水容器,已知平壁AB=CD=2.5m,BC及AD为半个圆柱体,半径R=1m,自由表面处压强为一个大气压,高度H=3m,试分别计算作用在单位长度上AB面、BC面和CD面所受到的静水总压力。(10分) 题2图 3、原型流动中油的运动粘性系数υp=15×10-5m2/s,其几何尺度为模型的5倍,如确定佛汝德数和雷诺数作为决定性相似准数,试问模型中流体运动粘性系数υm=?(10分) 4、如图所示,变直径圆管在水平面内以α=30。弯曲,直径分别为d1=0.2m,d2=0.15m,过水流量若为Q=0.1m3/s,P1=1000N/m2时,不计损失的情况下,求水流对圆管的作用 力及作用力的位置。(20分)

线性代数 英文讲义

Chapter 1 Matrices and Systems of Equations Linear systems arise in applications to such areas as engineering, physics, electronics, business, economics, sociology(社会学), ecology (生态学), demography(人口统计学), and genetics(遗传学), etc. §1. Systems of Linear Equations New words and phrases in this section: Linear equation 线性方程 Linear system,System of linear equations 线性方程组 Unknown 未知量 Consistent 相容的 Consistence 相容性 Inconsistent不相容的 Inconsistence 不相容性 Solution 解 Solution set 解集 Equivalent 等价的 Equivalence 等价性 Equivalent system 等价方程组 Strict triangular system 严格上三角方程组 Strict triangular form 严格上三角形式 Back Substitution 回代法 Matrix 矩阵 Coefficient matrix 系数矩阵 Augmented matrix 增广矩阵 Pivot element 主元 Pivotal row 主行 Echelon form 阶梯形 1.1 Definitions A linear equation (线性方程) in n unknowns(未知量)is 1122... n n a x a x a x b +++=

普通内科学主任副主任医师考试题库模拟试题

2015年普通内科学主任副主任医师考试题库(模拟试题) 一、单项选择题 1、以下哪项不是血清阴性脊柱关节病的特点 答案选项: A.附着点炎 B.HLA-B27阳性 C.骶髂关节炎 D.RF(+) E.血沉增快 正确答案: D 2、常用于检测抗核抗体(ANA)的实验方法为 答案选项: A.酶联免疫吸附法(ELISA) B.间接免疫荧光法(ⅡF) C.胶体金标记和快速膜渗滤技术 D.乳凝法 E.WesternBlot法检测 正确答案: B 3、ACR1991年髋关节骨性关节炎的临床标准之一是 答案选项: A.三个月来多数日子髋关节疼痛 B.晨僵≤30分钟 C.ESR≥45mm/小时 D.年龄≥40岁

E.ESR未查,髋屈曲≤115° 正确答案: E 4、系统性硬化病首发症状是 答案选项: A.雷诺现象(Rayhaud'sphenomenon) B.手指呈腊肠样肿胀 C.手背肿胀 D.关节疼痛 E.面具脸 正确答案: A 5、30%~50%白塞病患者伴有关节疼痛,最常累及的关节是 答案选项: A.肘关节 B.肩关节 C.膝关节 D.髋关节 E.腕关节 正确答案: C 6、血清抗主动脉抗体阳性达91.5%的血管炎病是 答案选项: A.变应性肉芽肿血管炎 B.风湿性多肌痛 C.巨细胞动脉炎

D.结节性多动脉炎 E.大动脉炎 正确答案: E 7、关于大动脉炎的预后,错误的是 答案选项: A.受累动脉不易形成侧支循环 B.5年生存率为93.8% C.10年生存率为90.9% D.只要不累及重要脏器供血多数预后良好 E.常见死亡原因为脑出血 正确答案: A 8、小血管血管炎中不包括 答案选项: A.Wegener肉芽肿 B.变应性肉芽肿血管炎 C.显微镜下多血管炎 D.巨细胞动脉炎 E.过敏性紫癜 正确答案: D 9、干燥综合征最早由 答案选项: A.眼科医师系统描写

流体力学试题及答案2

考试试卷(A B 卷) 学年第 二 学期 课程名称:流体力学 一、判断题(20分) 1. 从微观的角度来看,流体的物理量在时间上的分布是不连续的。 (T ) 2. 大气层中的压强与密度、温度的变化有关而且受季节、气候等因素的影 响。(T ) 3. 压力体的体积表示一个数学积分,与压力体内是否有气体无关。(T ) 4. 流体静止时,切应力为零。 (T ) 5. 温度升高液体的表面张力系数增大。 (F ) 6. 液滴内的压强比大气压小。 (F ) 7. 声音传播过程是一个等熵过程。 (T ) 8. 气体的粘性随温度的升高而增大。 (T ) 9. 应用总流伯努利方程解题时,两个断面间一定是缓变流,方程才成立。(F ) 10. 雷诺数是表征重力与惯性力的比值。 (F ) 11. 不可压缩流体只有在有势力的作用下才能保持平衡。(T ) 12. 对流程是指海拔11km 以上的高空。 (F ) 13. 静止的流体中任意一点的各个方向上的压强值均相等。(T ) 14. 在拉格朗日法中,流体质点轨迹给定,因此加速度很容易求得。(T ) 15. 对于定常流动的总流,任意两个截面上的流量都是相等的。(T ) 16. 紊流水力粗糙管的沿程水头损失系数与雷诺数无关。(T ) 17. 在研究水击现象时,一定要考虑流体的压缩性。(T ) 18. 雷诺数是一个无量纲数,它反映流动的粘性力与重力的关系。 (F ) 19. 当马赫数小于一时,在收缩截面管道中作加速流动。 (T ) 20. 对于冷却流动dq 小于0,亚音速流作减速运动,超音速流作加速运动。(T ) 二、填空题(10分) 1. 管道截面的变化、 剪切应力 及壁面的热交换,都会对一元可压缩流动产生影响。 2. 自由面上的压强的任何变化,都会 等值 地传递到液体中的任何一点,这就是由斯卡定律。 3. 液体在相对静止时,液体在重力、 惯性力 、和压力的联合作用下保持平衡。 4. 从海平面到11km 处是 对流层 ,该层内温度随高度线性地 降低 。 5. 平面壁所受到的液体的总压力的大小等于 形心处 的表压强与面积的乘积。 6. 水头损失可分为两种类型: 沿层损失 和 局部损失 。 7. 在工程实践中,通常认为,当管流的雷诺数超过 2320 ,流态属于紊流。 8. 在工程实际中,如果管道比较长,沿程损失远大于局部损失,局部损失可以忽略,这种管在水 力学中称为 长管 。 9. 紊流区的时均速度分布具有对数函数的形式,比旋转抛物面要均匀得多,这主要是因为脉动速 度使流体质点之间发生强烈的 动量交换 ,使速度分布趋于均匀。 10. 流体在运动中如果遇到因边界发生急剧变化的局部障碍(如阀门,截面积突变),流线会发生变 形,并出现许多大小小的 旋涡 ,耗散一部分 机械能,这种在局部区域被耗散掉的机械能称为局部水头损失。 三、选择题(单选题,请正确的答案前字母下打“∨”) 1. 流体的粘性与流体的__ __无关。 (A) 分子内聚力 (B) 分子动量交换 (C) 温度 (D) ∨ 速度梯度 2. 表面张力系数 的量纲是____ 。 (A) ∨ (B) (C) (D) 3. 下列四种液体中,接触角 的液体不润湿固体。 (A) ∨120o (B) 20o (C) 10o (D) 0o 4. 毛细液柱高度h 与____成反比。 (A) 表面张力系数 (B) 接触角 (C) ∨ 管径 (D) 粘性系数 5. 用一块平板挡水,平板形心的淹深为 ,压力中心的淹深为 ,当 增大时, 。 (A)增大 (B)不变 (C) ∨减小

流体力学英语词汇翻译(2)

流体力学英语词汇翻译(2) 流体力学英语词汇翻译(2)流体力学英语词汇翻译(2)动量厚度momentum thickness 能量厚度energy thickness 焓厚度enthalpy thickness 注入injection 吸出suction 泰勒涡taylor vortex 速度亏损律velocity defect law 形状因子shape factor 测速法anemometry 粘度测定法visco[si] metry 流动显示flow visualization 油烟显示oil smoke visualization 孔板流量计orifice meter 频率响应frequency response 油膜显示oil film visualization 阴影法shadow method 纹影法schlieren method 烟丝法smoke wire method

丝线法tuft method 氢泡法nydrogen bubble method 相似理论similarity theory 相似律similarity law 部分相似partial similarity 定理pi theorem, buckingham theorem 静[态]校准static calibration 动态校准dynamic calibration 风洞wind tunnel 激波管shock tube 激波管风洞shock tube wind tunnel 水洞water tunnel 拖曳水池towing tank 旋臂水池rotating arm basin 扩散段diffuser 测压孔pressure tap 皮托管pitot tube 普雷斯顿管preston tube 斯坦顿管stanton tube 文丘里管venturi tube u形管u-tube 压强计manometer

(完整版)流体力学练习题及答案

流体力学练习题及答案 一、单项选择题 1、下列各力中,不属于表面力的是( )。 A .惯性力 B .粘滞力 C .压力 D .表面张力 2、下列关于流体粘性的说法中,不准确的说法是( )。 A .粘性是实际流体的物性之一 B .构成流体粘性的因素是流体分子间的吸引力 C .流体粘性具有阻碍流体流动的能力 D .流体运动粘度的国际单位制单位是m 2/s 3、在流体研究的欧拉法中,流体质点的加速度包括当地加速度和迁移加速度,迁移加速度反映( )。 A .由于流体质点运动改变了空间位置而引起的速度变化率 B .流体速度场的不稳定性 C .流体质点在流场某一固定空间位置上的速度变化率 D .流体的膨胀性 4、重力场中平衡流体的势函数为( )。 A .gz -=π B .gz =π C .z ρπ-= D .z ρπ= 5、无旋流动是指( )流动。 A .平行 B .不可压缩流体平面 C .旋涡强度为零的 D .流线是直线的 6、流体内摩擦力的量纲 []F 是( )。 A . []1-MLt B . []21--t ML C . []11--t ML D . []2-MLt 7、已知不可压缩流体的流速场为xyj zi x 2V 2+= ,则流动属于( )。 A .三向稳定流动 B .二维非稳定流动 C .三维稳定流动 D .二维稳定流动 8、动量方程 的不适用于( ) 的流场。 A .理想流体作定常流动 in out QV QV F )()(ρρ∑-∑=∑

B.粘性流体作定常流动 C.不可压缩流体作定常流动 D.流体作非定常流动 9、不可压缩实际流体在重力场中的水平等径管道内作稳定流动时,以下陈述错误的是:沿流动方向( ) 。 A.流量逐渐减少B.阻力损失量与流经的长度成正比C.压强逐渐下降D.雷诺数维持不变 10、串联管道系统中,其各支管内单位质量流体的能量损失()。 A.一定不相等B.之和为单位质量流体的总能量损失C.一定相等D.相等与否取决于支管长度是否相等 11、边界层的基本特征之一是()。 A.边界层内流体的流动为层流B.边界层内流体的流动为湍流 C.边界层内是有旋流动D.边界层内流体的流动为混合流 12、指出下列论点中的错误论点:() A.平行流的等势线与等流线相互垂直B.点源和点汇的流线都是直线 C.点源的圆周速度为零D.点源和点涡的流线都是直线 13、关于涡流有以下的论点,指出其中的错误论点:涡流区域的( )。 A.涡流区域速度与半径成反比B.压强随半径的增大而减小 C.涡流区域的径向流速等于零D.点涡是涡流 14、亚音速气体在收缩管中流动时,气流速度()。 A.逐渐增大,压强逐渐增大B.逐渐增大,压强逐渐减小 C.逐渐减小,压强逐渐减小D.逐渐减小,压强逐渐增大 15、离心泵的安装高度超过允许安装高度时,离心泵会发生()现象。 A.离心泵内液体温度上升B.气缚 C.离心泵内液体发生汽化D.叶轮倒转

(完整word版)《线性代数》英文专业词汇.docx

《线性代数》英文专业词汇 序号英文中文1Linear Algebra线性代数 2determinant行列式 3row行 4column列 5element元素 6diagonal对角线 7principal diagona主对角线 8auxiliary diagonal次对角线 9transposed determinant转置行列式 10triangular determinants三角行列式 11the number of inversions逆序数 12even permutation奇排列 13odd permutation偶排列 14parity奇偶性 15interchange互换 16absolute value绝对值 17identity恒等式 18n-order determinants n 阶行列式 19evaluation of determinant行列式的求值 20Laplace ’s expansion theorem拉普拉斯展开定理21cofactor余子式 22Algebra cofactor代数余子式 23the Vandermonde determinant范德蒙行列式 24bordered determinant加边行列式 25reduction of the order of a determinant降阶法 26method of Recursion relation递推法 27induction归纳法 28Cramer′s rule克莱姆法则 29matrix矩阵 30rectangular矩形的 31the zero matrix零矩阵

流体力学试题及答案B(过控)

流体力学试题及答案B(过控) 部门: xxx 时间: xxx 整理范文,仅供参考,可下载自行编辑

中国矿业大学2008~2009学年第 2 学期 《工程流体力学》试卷。 A.减小,增大; B.增大,减小; C.减小,不变; D.减小,减小 2.等角速度w旋转容器,半径为R,内盛有密度为r的液体,则旋转前后容器底压强分布( >; A.相同; B.不相同; 底部所受总压力( > 。 A.相等; B.不相等。 3.某点的真空度为65000 Pa,当地大气压为0.1MPa,该点的绝对压强为: A. 65000Pa; B. 55000Pa; C. 35000Pa; D. 165000Pa。p1EanqFDPw

4.静止流体中任意形状平面壁上压力值等于___ 处静水压强与受压面积的乘积< )。 A.受压面的中心。 B.受压面的重心。 C.受压面的形心。 D.受压面的垂心。 5.粘性流体静压水头线的沿流程变化的规律是(>。 A.沿程下降B.沿程上升C.保持水平D.前三种情况都有可能。6.流动有势的充分必要条件是(>。 A.流动是无旋的; B.必须是平面流动; C.必须是无旋的平面流动;D.流线是直线的流动。 7.动力粘滞系数的单位是(>。 AN·s/m B. N·s/m2C. m2/sD. m/s 8.雷诺实验中,由层流向紊流过渡的临界流速和由紊流向层流过渡的临界流速之间的关系是(>。 A.<; B. >; C. =; D. 不确 定 9.在如图所示的密闭容器上装有U形水银测压计,其 中1、2、3点位于同一水平面上,其压强关系为: A. p1=p2=p3; B. p1>p2>p3; C. p1存在的充分必要条件是< ) A. 有势流动; B. 不可压缩流体的流动; C. 平面流动; D. 不可压缩流体的平面流动。

线性代数 英文讲义

Chapter 4 Linear Transformations In this chapter, we introduce the general concept of linear transformation from a vector space into a vector space. But, we mainly focus on linear transformations from n R to m R. §1 Definition and Examples New words and phrases Mapping 映射 Linear transformation 线性变换 Linear operator 线性算子 Dilation 扩张 Contraction 收缩 Projection 投影 Reflection 反射 Counterclockwise direction 反时针方向 Clockwise direction 顺时针方向 Image 像 Kernel 核 1.1 Definition ★Definition A mapping(映射) L: V W is a rule that produces a correspondence between two sets of elements such that to each element in the first set there corresponds one and only one element in the second set. ★Definition A mapping L from a vector space V into a vector space W is said to be a linear transformation(线性变换)if

相关主题
文本预览
相关文档 最新文档