Terrorism and cyber warfare are examples of ________, a type of conflict in which the weak exploit technology and psychology to target the peripheral vulnerabilities of the strong.
Fill in the blank(s) with the appropriate word(s).
asymmetric threat and warfare
Political Science
You might also like to view...
Created in 1935, __________ put 8.5 million Americans to work building roads, public buildings, parks, and airports
a. the Head Start program b. the Works Progress Administration c. the Personal Responsibility and Work Opportunity Reconciliation Act d. the Veterans' Assistance program
Political Science
Sally is writing an introduction to a research paper. She has just finished reviewing previous literature on the topic. What would you recommend that Sally do next in her introduction?
a. explain problems or inconsistencies in the literature b. explain gaps in the literature c. articulate tension areas in the literature d. all of the above
Political Science