题目内容

(一)[背景资料]某建筑公司承接了一地处闹市区的某商务中心的施工任务。该工程地下三层,地上二十层,基坑深8.75m,基础为箱形基础,上部结构为现浇剪力墙结构。基础施工阶段,施工单位编制了土方开挖施工方案.并抄送总监理工程师后进行施工。挖土机直接开挖到设计标高后,项目经理组织人员对基坑进行了验槽,认为合格并通知了监理。因连续的季节性大雨,未及时浇筑垫层,造成土方边坡局部塌方,经济损失15万元。施工单位认为塌方是不可抗力造成的,损失应由甲方承担,并同时提出工期索赔。在上部结构施工时,材料已经送样。由于工期较紧,施工单位未经监理工程师许可即进行了混凝土浇筑。经测试混凝土试块强度没有达标。另外,为赶进度,施工单位提前进场了一批室内装饰用的花岗石,并会同监理对这批石材的外表进行了查看,双方认为质量合格,无需复验。问题: 施工单位认为塌方是不可抗力造成的,不应由其承担经济损失并提出索赔是否合理?请说明理由。

查看答案
更多问题

WebSQL is a SQL-like (26) language for extracting information from the weB. Its capabilities for performing navigation of web (27) make it a useful tool for automating several web-related tasks that require the systematic processing of either ail the links in a (28) , all the pages that can be reached from a given URL through (29) that match a pattern, or a combination of both. WebSQL also provides transparent access to index servers that can be queried via the Common (30) Interface. (30)是()

A. Router
B. Device
Computer
D. Gateway

WebSQL is a SQL-like (26) language for extracting information from the weB. Its capabilities for performing navigation of web (27) make it a useful tool for automating several web-related tasks that require the systematic processing of either ail the links in a (28) , all the pages that can be reached from a given URL through (29) that match a pattern, or a combination of both. WebSQL also provides transparent access to index servers that can be queried via the Common (30) Interface. (26)是()

A. query
B. transaction
C. communication
D. programming

______ Development is a structured design methodology that proceeds in a sequence from one phase to the next.

A. Waterfall
B. Phased
C. Prototyping
D. Parallel

Melissa and LoveLetter made use of the trust that exists between friends or colleagues. Imagine receiving an (6) from a friend who asks you to open it. This is what happens with Melissa and several other similar email (7) . Upon running, such worms usually proceed to send themselves out to email addresses from the victim’address book, previous emails, web pages (8) . A. names B. cookies C. software D. extensions

As administrators seek to block dangerous email attachments through the recognition of well-known (9) , virus writers use other extensions to circumvent such protection. Executable(.exe)files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.
B. Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwouds and give the (10) access to your network.

答案查题题库