Skip to main content

标 题: 上下轮胎需要注意的几个细节。

发信人: saja (洒家), 信区: Cycling
标  题: 上下轮胎需要注意的几个细节。
发信站: BBS 未名空间站 (Thu Sep  4 21:35:51 2008)

1、要先松闸。

2、取下后轮轮胎之前,变速自行车要把链条挂到最外面的cog上,否则链条会太紧。

3、取下轮胎后,如果轮胎有排水纹,要检查排水纹是否嵌进小石子(最好成为例行检
查)。哪怕它们并没有穿透轮胎,也可能会成为以后flat tire的原因。

4、有排水纹的轮胎,轮胎侧面一般有方向指示,取下/装上轮胎时要注意。不要装反。

5、用撬胎棒时,从与气嘴相对的另一侧开始,避免撬坏气嘴旁的内胎。

6、取下内胎时,也要从离气嘴较远的地方开始。原因同上。

7、内胎取下后,不要随手放在地上,免得被路上的石子划伤。可以挂在身上。

8、检查外胎内侧,看是不是有嵌进去的钉子等。

9、检查钢圈,看rim tape是不是被spoke nipple 穿透,如果是,要用电工胶贴上,否
则内胎很快就会爆掉。

10、如果补胎,打磨内胎时,最好从两个方向打磨,成十字形。

11、装上内胎时,要稍微充气。

12、装轮胎时,注意内胎不要被外胎夹住。否则会很快再次爆胎。放回去后,先打20左右压力的气,然后一边转轮子一边每个地方都捏捏,保证内胎乖乖到了外胎里边没有被压住,然后再打到40左右,再绕圈拍一圈,或者在地上颠一颠,保证内内胎不被夹住,然后打满。

13、把外胎塞到车轮里时,从气嘴附近的位置开始,两个手分别从两个方向把外胎挤进去,到离气嘴最远的位置会合。

14、记得把闸重新紧上。

http://gengwg.blogspot.com/

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...