题目内容

某施工单位通过投标获得了某市一高级公路路面施工工程。由于该项目的各专业人才集中在现场办公,专业技术人员在项目施工中协同工作,所以在劳动力组合管理方面采取J了混合工作队式管理方式。 该路面底基层为填隙碎石,基层为水泥稳定碎石,面层为沥青混凝土。该段高级公路全长80 km,设计时速:120 km/h。 填隙碎石的施工_丁艺包括:①运输和摊铺粗碎石;②撒布填隙料;③初压;④再次撒布填隙料;⑤振动压实。 该施工单位依据有关标准和规范,并结合建设任务、施工管理和质量检验评定,狠抓工程质量,在各分部分项工程完成后,做了质量检验。 根据以上材料,回答下列问题: 场景中的路面水泥稳定碎石基层施工时应注意( )。

A. 水泥稳定碎石基层水泥剂量不宜超过6%
B. 施工时,必须采用顺序作业法
C. 当分层施工时,第二层必须在第一层养生7天后方可铺筑
D. 该施工期宜在春末和气温较高的季节
E. 施工时,应做水泥稳定土的延迟时间对其强度影响的试验,以指导施工

查看答案
更多问题

Passage 4 In the 1950s, the pioneers of artificial intelligence (AI) predicted that, by the end of this century, computers would be conversing with us at work and robots would be performing our housework. But as useful as computers are, they’re nowhere close to achieving remotely resembling these early aspirations for humanlike behavior. Never mind something as complex as conversation: the most powerful computers struggle to reliably recognize the shape of an object, the most elementary of a ten-month-old kid. A growing group of AI researchers think they know where the field went wrong. The problem, the scientists say, is that AI has been trying to separate the highest, most abstract levels of thought, like language and mathematics, and to duplicate them with logical, step-by-step programs. A new movement in AI, on the other hand, takes a closer look at the more roundabout way in which nature came up with intelligence. Many of these researchers study evolution and natural adaptation instead of formal logic and conventional computer programs. Rather than digital computers and transistors, some want to work with brain cells and proteins. The results of these early efforts are as promising as they are peculiar, and the new nature-based Al movement is slowly but surely moving to the forefront of the field. Imitating the brain’s neural network is a huge step in the right direction, says computer Scientist and biophysicist Michael Conrad, but it still misses an important aspect of natural intelligence. "People tend to treat the brain as if it were made up of color-coded transistors", he explains." But it’s not simply a clever network of switches. There are lots of important things going on inside the brain cells themselves." Specifically, Conrad believes that many of the brain’s capabilities stem from the pattern-recognition proficiency of the individual molecules that make up each brain cell. The best way to build an artificially intelligent device, he claims, would be to build it around the same sort of molecular skills. Right now, the notion that conventional computers and software are fundamentally incapable of matching the processes that take place in the brain remains controversial. But if it proves true, then the efforts of Conrad and his fellow AI rebels could turn out to be the only game in town. Conrad and his group of AI researchers have been making enormous efforts to ______.

A. find a roundabout way to design powerful computers
B. build a computer using a clever network of switches
C. find out how intelligence developed in nature
D. separate the highest and most abstract levels of thought

某施工单位承包了高级公路K25+100~K30+50段的路面施工工程,路基宽为20 m,设计行车时速为100 km/h,公路全长30 km,路面结构为:路面底基层为级配啐石30 cm,20 cm石灰稳定碎石土基层,25 cm沥青混合料面层,施工单位在施工过程中严格按设计要求和操作规程开展施工,在沥青混凝土路面施工前制定了详细的施工安全要点,现摘录部分如下: ①摊铺机卸料时,熨平装置的端头与路缘石应有一定间距,以免发生碰撞; ②人工装卸桶装沥青时,运输车应停在有坡度地段,方便装卸; ③用柴油清洗摊铺机时.不许接近明火; ④采用切缝机切缝前应先打开冷却水,冷却水中断时.应停止切缝。施工单位在沥青混凝土的施工过程中,对其施工内容做了符合规范要求的检验, 根据以上材料 回答下列问题 若对用于K25+100~K30+50段的级配碎石中间层,宜采用不同粒级的单一尺寸的( ),按预定配合比在拌和机拌制级配碎石混合料。

A. 细砂和矿粉
B. 碎石和石屑
C. 砾石和砂砾
D. 中砂和泥浆

Part A For questions 1 - 5 ,you will hear a passage. Listen and answer the questions with the information you’ve heard. Write not more than 3 words in each blank. You will hear the recording twice. You now have 25 seconds to read the questions below. In ______, Bill Gates establish the Microsoft Company.

Passage 1 Software piracy problems exist and have been exacerbated in recent years due to IS overload, decentralized purchasing, budget constraints, general user and corporate management attitudes, lack of knowledge of the copyright laws, and now Internet access. Most organizations have not managed their software very effectively. Determining the extent of the problem is a time-consuming process. The industry’s response has been to form trade associations to educate the public about the copyright law and to aggressively pursue pirates. Some of the largest PC companies have set up their own in-house programs to combat the problem. Corporate exposure is increasing due to the need to manage more machines, software and on-line and Internet access. Civil and criminal penalties for copyright infringement have stiffened. As a result, trade association resources have increased significantly as well as calls to hotlines from unhappy employees due to corporate downsizing. When infringing software is reported, the company is at risk of embarrassing litigation for copyright infringement. The company will most probably lose as the copyright holder usually has a "smoking gun" based on reports from former employees or other whistle blowers. There is also the simple fact that no matter how hard the IS staff try, there are and always will be copies of software programs that cannot be validated by purchasing records. They come in from home, are created by otherwise conscientious employees trying to get their jobs done or just unauthorized copies by purchasing records. They come in unauthorized copies created by cost conscious managers and employees. Internet access only increases these problems as software is downloaded from sites worldwide. A software management program will reduce the risks from using counterfeit or copied software and help avoid damage from viruses and corrupt programs. By conducting an audit before infringement is reported the corporation will reduce its exposure. It is easy to inventory software programs on any particular machine. However, matching the software to the licensing documents is no easy task. Interpreting the variety of software licenses takes familiarity with industry business and licensing practices. Networks make the task much more complex. Internet access compounds the problem. Employers should set guidelines for when and how to download software and data from on-line services and the Internet. Most software vendors maintain on-line support and provide the ability to download bug fixes and program updates. However, one bad virus can wreak havoc throughout a company’s networks and shut down the whole system. Firewall technology that controls access to and from outside systems can help. Information systems staff should work with management to develop policies that reduce risk but reflect the level of openness that suits a particular company’s corporate culture. The author advises information systems staff to work with management in making policies because ______.

A. they are in charge of making policies
B. they are responsible for avoidance of software piracy
C. they are familiar with the company’s corporate culture
D. they are frequently the actual wrong-doers

答案查题题库