1.下列不属于岩石变形特征的是()2.在介质内部传播的波叫()3.工程爆破常用的雷管是4.楔形掏槽的优点不包括5.下列那一项属于垂直掏槽6..下列不属于影响岩石力学性质的因素是7.在地下矿山,开凿在岩体或矿层中不直通地表的水平通道称为平硐。8.钎杆的破坏形式主要有钎尾锥顶和炸顶、钎肩磨损、断裂9.地下采场深孔爆破时平行布孔和扇形布孔相比较每米深孔崩矿量大,作业相对安全。10.起爆器材包括进行爆破作业引爆工业炸药的一切点火和起爆工具,按其作用可分为起爆材料和传爆材料。11.炸药的爆轰波传播理论是建立在流体力学基础上的12.岩石按照岩石成因分为岩浆岩、沉积岩、变质岩三大类13.工业上常用的起爆药有,雷汞、氮化铅、梯恩梯。()14.炸药发生爆炸时引起与它相接触的炸药爆炸的现象称为殉爆。
2022-04-06 00:18:54 14KB 安全
东大22春《常用电器控制技术(含PLC)Ⅰ》在线平时作业1
2022-04-06 00:17:03 19KB PLC
1
东大22春《电力电子电路》在线平时作业1-00001 试卷总分100 得分100 一、单选题 (共 10 道试题,共 50 分) 1.单相半波可控整流电路一共有( )只晶闸管。 A.1 B.2 C.3 D.4 答案A 2.单结晶体管三个电极分别为( )。 A.发射极,基极,集电极; B.第一基极,发射极,第二基极; C.源极,栅极,漏极; D.阴极,门极,阳极。 答案B 3.绝缘栅双极晶体管IGBT三个电极分别为( )。 A.发射极,基极,集电极; B.发射极,栅极,集电极; C.源极,栅极,漏极; D.阴极,门极,阳极。 答案B 4.锯齿波触发电路,整定初始相位时需要调整( )。 A.电源电压UE B.控制电压Uct C.偏移电压Up D.同步电压UTS 答案C 5.不可控整流电路中的二极管在( )换流。 A.通电时 B.断电时 C.触发时 D.电压过零时 答案D 6.单相全波可控整流电路一共有( )只晶闸管。 A.1
2022-04-06 00:17:03 17KB 电力电子电路
1
这是activity-5.22.0的源码包,在做流程设计器的时候可以使用springmvc加上源码的方式调试。
2022-04-05 13:21:28 16.38MB activity
1
毕业生是否会选择创业公司的调研结果显示,45.24%的应届毕业生表示会接受创业公司的offer,43.28%的高校毕业生持观望态度,选择了待定,并表示要看创业公司的行业/领域,3.82%的应届毕业生表示没想过这个问题。此外仅有7.66%的应届毕业生表示不会接受创业公司。具体分析选择创业公司offer的原因可以发现,在选择接受创业公司的人群中,30.27%是因为创业公司能锻炼人,7.82%是因为目前没有别的合适机会,7.15%是因为喜欢创业公司的企业文化。而拒绝创业公司的主要原因在于觉得创业公司经营风险系数高。在整体就业压力感知增加的情况下,2019应届毕业生对于创业公司的包容性有所增加,而创业
2022-04-05 10:42:37 432KB 消费者 人群研究 人力资源
1
android-studio-bundle-145.3537739-windows(14/22)
2022-04-04 22:57:51 79MB android studio
1
Advanced Penetration Testing For Highly-Secured Environments -2012.pdf BackTrack 5 Wireless Penetration Testing Beginners Guide.pdf Basic Security Testing with Kali Linux (2014).PDF Gray Hat Hacking 2nd Edition.pdf Hacking - Firewalls And Networks How To Hack Into Remote Computers.pdf Hacking The Art Of Exploitation(2nd Edition)-2008.pdf Hacking Wireless Networks For Dummies -2005.pdf Web Penetration Testing with Kali Linux -2013.pdf Hacking with Kali - Practical Penetration Testing Techniques 2014.pdf Instant Kali Linux -2013.pdf Kali Linux Cookbook -2013.pdf Kali Linux Social Engineering -2013.pdf Kali Linux:Assuring Security By Penetration Testing -2014.pdf Learning.Nessus.for.Penetration.Testing.Jan.2014.pdf Metasploit The Penetration Testers Guide- 2011.pdf Metasploit.Penetration.Testing.Cookbook.Jun.2012.pdf Offensive Security - Penetration Testing with BackTrack.pdf The Basics of Hacking and Penetration Testing.pdf 字数限制,还有5本书名字没写出.....,物超所值! 本资料共包含以下附件: Kali Linux.part01.rar Kali Linux.part02.rar Kali Linux.part03.rar Kali Linux.part04.rar Kali Linux.part05.rar Kali Linux.part06.rar
2022-04-03 19:47:57 15.75MB Kali Linux 渗透测试 backtrack
1
Advanced Penetration Testing For Highly-Secured Environments -2012.pdf BackTrack 5 Wireless Penetration Testing Beginners Guide.pdf Basic Security Testing with Kali Linux (2014).PDF Gray Hat Hacking 2nd Edition.pdf Hacking - Firewalls And Networks How To Hack Into Remote Computers.pdf Hacking The Art Of Exploitation(2nd Edition)-2008.pdf Hacking Wireless Networks For Dummies -2005.pdf Web Penetration Testing with Kali Linux -2013.pdf Hacking with Kali - Practical Penetration Testing Techniques 2014.pdf Instant Kali Linux -2013.pdf Kali Linux Cookbook -2013.pdf Kali Linux Social Engineering -2013.pdf Kali Linux:Assuring Security By Penetration Testing -2014.pdf Learning.Nessus.for.Penetration.Testing.Jan.2014.pdf Metasploit The Penetration Testers Guide- 2011.pdf Metasploit.Penetration.Testing.Cookbook.Jun.2012.pdf Offensive Security - Penetration Testing with BackTrack.pdf The Basics of Hacking and Penetration Testing.pdf 字数限制,还有5本书名字没写出.....,物超所值! 本资料共包含以下附件: Kali Linux.part01.rar Kali Linux.part02.rar Kali Linux.part03.rar Kali Linux.part04.rar Kali Linux.part05.rar Kali Linux.part06.rar
2022-04-03 19:47:24 42.92MB Kali Linux 渗透测试 backtrack
1
Advanced Penetration Testing For Highly-Secured Environments -2012.pdf BackTrack 5 Wireless Penetration Testing Beginners Guide.pdf Basic Security Testing with Kali Linux (2014).PDF Gray Hat Hacking 2nd Edition.pdf Hacking - Firewalls And Networks How To Hack Into Remote Computers.pdf Hacking The Art Of Exploitation(2nd Edition)-2008.pdf Hacking Wireless Networks For Dummies -2005.pdf Web Penetration Testing with Kali Linux -2013.pdf Hacking with Kali - Practical Penetration Testing Techniques 2014.pdf Instant Kali Linux -2013.pdf Kali Linux Cookbook -2013.pdf Kali Linux Social Engineering -2013.pdf Kali Linux:Assuring Security By Penetration Testing -2014.pdf Learning.Nessus.for.Penetration.Testing.Jan.2014.pdf Metasploit The Penetration Testers Guide- 2011.pdf Metasploit.Penetration.Testing.Cookbook.Jun.2012.pdf Offensive Security - Penetration Testing with BackTrack.pdf The Basics of Hacking and Penetration Testing.pdf 字数限制,还有5本书名字没写出.....,物超所值! 本资料共包含以下附件: Kali Linux.part01.rar Kali Linux.part02.rar Kali Linux.part03.rar Kali Linux.part04.rar Kali Linux.part05.rar Kali Linux.part06.rar
2022-04-03 19:46:28 42.92MB Kali Linux 渗透测试 backtrack
1
Advanced Penetration Testing For Highly-Secured Environments -2012.pdf BackTrack 5 Wireless Penetration Testing Beginners Guide.pdf Basic Security Testing with Kali Linux (2014).PDF Gray Hat Hacking 2nd Edition.pdf Hacking - Firewalls And Networks How To Hack Into Remote Computers.pdf Hacking The Art Of Exploitation(2nd Edition)-2008.pdf Hacking Wireless Networks For Dummies -2005.pdf Web Penetration Testing with Kali Linux -2013.pdf Hacking with Kali - Practical Penetration Testing Techniques 2014.pdf Instant Kali Linux -2013.pdf Kali Linux Cookbook -2013.pdf Kali Linux Social Engineering -2013.pdf Kali Linux:Assuring Security By Penetration Testing -2014.pdf Learning.Nessus.for.Penetration.Testing.Jan.2014.pdf Metasploit The Penetration Testers Guide- 2011.pdf Metasploit.Penetration.Testing.Cookbook.Jun.2012.pdf Offensive Security - Penetration Testing with BackTrack.pdf The Basics of Hacking and Penetration Testing.pdf 字数限制,还有5本书名字没写出.....,物超所值! 本资料共包含以下附件: Kali Linux.part01.rar Kali Linux.part02.rar Kali Linux.part03.rar Kali Linux.part04.rar Kali Linux.part05.rar Kali Linux.part06.rar
2022-04-03 19:45:21 42.92MB kali linux backtrack
1