试题与答案

患者,男,67岁,戴下颌活动义齿5年,因咀嚼无力前来就诊。检查:左下中切牙,左下后牙

题型:单项选择题 案例分析题

题目:

患者,男,67岁,戴下颌活动义齿5年,因咀嚼无力前来就诊。检查:左下中切牙,左下后牙全部缺失,右下中切牙,右下第二前磨牙,第一、第三磨牙缺失,右下第二磨牙轻度向近中倾斜,余留牙稳固,形态正常,左侧牙槽嵴低平,右侧牙槽嵴丰满度适中,对颌为天然牙。缺失牙已行可摘局部义齿修复,义齿固位不良,人工牙面磨耗严重,右下第二磨牙放置近中支托三臂卡环,右下第一前磨牙放置远中支托三臂卡环,左下尖牙放置RPI组合卡,双侧舌板连接。

义齿出现固位不良的可能原因,下列哪项除外().

A.固位体固位臂位置不合适

B.固位体类型不当

C.基托伸展不够

D.人工牙面形态不良

E.基托边缘封闭不良

答案:

参考答案:D

试题推荐
题型:单项选择题

To compete in today’s fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitors and guests to access their internal enterprise networks. These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points. In allowing this open access for third parties, LANs become (1). Third parties can introduce risk in a variety of ways from connecting with an infected laptop to unauthorized access of network resources to(2)activity. For many organizations, however, the operational complexity and costs to ensure safe third party network access have been prohibitive. Fifty-two percent of surveyed CISOs state that they currently use a moat and castle’s security approach, and admit that defenses inside the perimeter are weak. Threats from internal users are also increasingly a cause for security concerns. Employees with malicious intent can launch(4)of service attacks or steal (5) information by snooping the network. As they access the corporate network, mobile and remote users inadvertently can infect the network with (6)and worms acquired from unprotected public networks. Hackers masquerading as internal users can take advantage of weak internal security to gain access to confidential information.

1()

A.damageable

B.susceptible

C.changeable

D.vulnerable

查看答案
微信公众账号搜索答案