[["Question: Which of these statements best describes the HM approach to sectoral security analysis?\nChoices:\nA. HM agrees with the idea that security can be viewed using a sectoral framework, and recognises the depth of analysis that is enabled by such an approach.\nB. HM rejects Buzan et al.'s theory of sectoral security analysis, on the grounds that securitization is a product of a state-centric approach.\nC. HM rejects the assertion by Buzan et al. that there are distinct and separate sectors of security, instead adopting a holistic view of security within which national and transnational class is an important factor.\nD. HM favours the sectoral approach to security analysis, in particular prioritising the state as a referent object and drawing much of its theoretical foundations from the realist principles that underpin the sectoral approach.\nAnswer:"," HM agrees with the idea that security can be viewed using a sectoral framework, and recognises the depth of analysis that is enabled by such an approach."],["Question: Which of these statements best describes the HM approach to sectoral security analysis?\nChoices:\nA. HM agrees with the idea that security can be viewed using a sectoral framework, and recognises the depth of analysis that is enabled by such an approach.\nB. HM rejects Buzan et al.'s theory of sectoral security analysis, on the grounds that securitization is a product of a state-centric approach.\nC. HM rejects the assertion by Buzan et al. that there are distinct and separate sectors of security, instead adopting a holistic view of security within which national and transnational class is an important factor.\nD. HM favours the sectoral approach to security analysis, in particular prioritising the state as a referent object and drawing much of its theoretical foundations from the realist principles that underpin the sectoral approach.\nAnswer:"," HM rejects Buzan et al.'s theory of sectoral security analysis, on the grounds that securitization is a product of a state-centric approach."],["Question: Which of these statements best describes the HM approach to sectoral security analysis?\nChoices:\nA. HM agrees with the idea that security can be viewed using a sectoral framework, and recognises the depth of analysis that is enabled by such an approach.\nB. HM rejects Buzan et al.'s theory of sectoral security analysis, on the grounds that securitization is a product of a state-centric approach.\nC. HM rejects the assertion by Buzan et al. that there are distinct and separate sectors of security, instead adopting a holistic view of security within which national and transnational class is an important factor.\nD. HM favours the sectoral approach to security analysis, in particular prioritising the state as a referent object and drawing much of its theoretical foundations from the realist principles that underpin the sectoral approach.\nAnswer:"," HM rejects the assertion by Buzan et al. that there are distinct and separate sectors of security, instead adopting a holistic view of security within which national and transnational class is an important factor."],["Question: Which of these statements best describes the HM approach to sectoral security analysis?\nChoices:\nA. HM agrees with the idea that security can be viewed using a sectoral framework, and recognises the depth of analysis that is enabled by such an approach.\nB. HM rejects Buzan et al.'s theory of sectoral security analysis, on the grounds that securitization is a product of a state-centric approach.\nC. HM rejects the assertion by Buzan et al. that there are distinct and separate sectors of security, instead adopting a holistic view of security within which national and transnational class is an important factor.\nD. HM favours the sectoral approach to security analysis, in particular prioritising the state as a referent object and drawing much of its theoretical foundations from the realist principles that underpin the sectoral approach.\nAnswer:"," HM favours the sectoral approach to security analysis, in particular prioritising the state as a referent object and drawing much of its theoretical foundations from the realist principles that underpin the sectoral approach."],["Question: To what extent is TNC linked with terrorism, and in what ways?\nChoices:\nA. There is growing evidence of direct partnerships between terrorist groups and transnational criminal organization resulting from the end of the Cold War and the need to secure new forms of financial sponsorship. For most terrorist groups criminal activity has been amongst the most important sources of funds with the diffusion of terrorist networks globally operating in correlation to the diffusion of illicit market activities.\nB. The nexus between terrorist groups and criminal organizations are generally a temporary aberration. Differential long-term strategic goals meant that levels of cooperation were generally tactical temporary alliances that would have little pervasive effects.\nC. There is increasing evidence over the convergence of terrorism and transnational crime, but there is no consensus about whether this phenomenon is a long-term strategic alliance or episodic \"marriages of convenience\".\nD. All of these options.\nAnswer:"," There is growing evidence of direct partnerships between terrorist groups and transnational criminal organization resulting from the end of the Cold War and the need to secure new forms of financial sponsorship. For most terrorist groups criminal activity has been amongst the most important sources of funds with the diffusion of terrorist networks globally operating in correlation to the diffusion of illicit market activities."],["Question: To what extent is TNC linked with terrorism, and in what ways?\nChoices:\nA. There is growing evidence of direct partnerships between terrorist groups and transnational criminal organization resulting from the end of the Cold War and the need to secure new forms of financial sponsorship. For most terrorist groups criminal activity has been amongst the most important sources of funds with the diffusion of terrorist networks globally operating in correlation to the diffusion of illicit market activities.\nB. The nexus between terrorist groups and criminal organizations are generally a temporary aberration. Differential long-term strategic goals meant that levels of cooperation were generally tactical temporary alliances that would have little pervasive effects.\nC. There is increasing evidence over the convergence of terrorism and transnational crime, but there is no consensus about whether this phenomenon is a long-term strategic alliance or episodic \"marriages of convenience\".\nD. All of these options.\nAnswer:"," The nexus between terrorist groups and criminal organizations are generally a temporary aberration. Differential long-term strategic goals meant that levels of cooperation were generally tactical temporary alliances that would have little pervasive effects."],["Question: To what extent is TNC linked with terrorism, and in what ways?\nChoices:\nA. There is growing evidence of direct partnerships between terrorist groups and transnational criminal organization resulting from the end of the Cold War and the need to secure new forms of financial sponsorship. For most terrorist groups criminal activity has been amongst the most important sources of funds with the diffusion of terrorist networks globally operating in correlation to the diffusion of illicit market activities.\nB. The nexus between terrorist groups and criminal organizations are generally a temporary aberration. Differential long-term strategic goals meant that levels of cooperation were generally tactical temporary alliances that would have little pervasive effects.\nC. There is increasing evidence over the convergence of terrorism and transnational crime, but there is no consensus about whether this phenomenon is a long-term strategic alliance or episodic \"marriages of convenience\".\nD. All of these options.\nAnswer:"," There is increasing evidence over the convergence of terrorism and transnational crime, but there is no consensus about whether this phenomenon is a long-term strategic alliance or episodic \"marriages of convenience\"."],["Question: To what extent is TNC linked with terrorism, and in what ways?\nChoices:\nA. There is growing evidence of direct partnerships between terrorist groups and transnational criminal organization resulting from the end of the Cold War and the need to secure new forms of financial sponsorship. For most terrorist groups criminal activity has been amongst the most important sources of funds with the diffusion of terrorist networks globally operating in correlation to the diffusion of illicit market activities.\nB. The nexus between terrorist groups and criminal organizations are generally a temporary aberration. Differential long-term strategic goals meant that levels of cooperation were generally tactical temporary alliances that would have little pervasive effects.\nC. There is increasing evidence over the convergence of terrorism and transnational crime, but there is no consensus about whether this phenomenon is a long-term strategic alliance or episodic \"marriages of convenience\".\nD. All of these options.\nAnswer:"," All of these options."],["Question: In what ways do theories of conventional and critical social constructivism differ?\nChoices:\nA. Conventional constructivists view constructivism as a bridge between rationalist and reflectivist approaches, enabling both to benefit from the insights of the other. Conversely, critical constructivists argue that this approach simply reproduces the binary distinctions that characterize positivist methodology.\nB. Critical constructivism regards the strength of social constructivism to be its ability to bridge rationalist and reflectivity approaches. Conversely, social constructivists regard this as an unhelpful regression to positivist binary frameworks of analysis.\nC. Conventional constructivism refers to the earlier works of social constructivist theorists that are characterised by a rejection of positivist methodology. Critical constructivists challenge these theories, embracing positivist methodologies in their work.\nD. Social constructivism is best understood as a uniform approach to the construction of social identities and security; although distinctions exist within the field, these are not easily defined as distinctive separate approaches.\nAnswer:"," Conventional constructivists view constructivism as a bridge between rationalist and reflectivist approaches, enabling both to benefit from the insights of the other. Conversely, critical constructivists argue that this approach simply reproduces the binary distinctions that characterize positivist methodology."],["Question: In what ways do theories of conventional and critical social constructivism differ?\nChoices:\nA. Conventional constructivists view constructivism as a bridge between rationalist and reflectivist approaches, enabling both to benefit from the insights of the other. Conversely, critical constructivists argue that this approach simply reproduces the binary distinctions that characterize positivist methodology.\nB. Critical constructivism regards the strength of social constructivism to be its ability to bridge rationalist and reflectivity approaches. Conversely, social constructivists regard this as an unhelpful regression to positivist binary frameworks of analysis.\nC. Conventional constructivism refers to the earlier works of social constructivist theorists that are characterised by a rejection of positivist methodology. Critical constructivists challenge these theories, embracing positivist methodologies in their work.\nD. Social constructivism is best understood as a uniform approach to the construction of social identities and security; although distinctions exist within the field, these are not easily defined as distinctive separate approaches.\nAnswer:"," Critical constructivism regards the strength of social constructivism to be its ability to bridge rationalist and reflectivity approaches. Conversely, social constructivists regard this as an unhelpful regression to positivist binary frameworks of analysis."],["Question: In what ways do theories of conventional and critical social constructivism differ?\nChoices:\nA. Conventional constructivists view constructivism as a bridge between rationalist and reflectivist approaches, enabling both to benefit from the insights of the other. Conversely, critical constructivists argue that this approach simply reproduces the binary distinctions that characterize positivist methodology.\nB. Critical constructivism regards the strength of social constructivism to be its ability to bridge rationalist and reflectivity approaches. Conversely, social constructivists regard this as an unhelpful regression to positivist binary frameworks of analysis.\nC. Conventional constructivism refers to the earlier works of social constructivist theorists that are characterised by a rejection of positivist methodology. Critical constructivists challenge these theories, embracing positivist methodologies in their work.\nD. Social constructivism is best understood as a uniform approach to the construction of social identities and security; although distinctions exist within the field, these are not easily defined as distinctive separate approaches.\nAnswer:"," Conventional constructivism refers to the earlier works of social constructivist theorists that are characterised by a rejection of positivist methodology. Critical constructivists challenge these theories, embracing positivist methodologies in their work."],["Question: In what ways do theories of conventional and critical social constructivism differ?\nChoices:\nA. Conventional constructivists view constructivism as a bridge between rationalist and reflectivist approaches, enabling both to benefit from the insights of the other. Conversely, critical constructivists argue that this approach simply reproduces the binary distinctions that characterize positivist methodology.\nB. Critical constructivism regards the strength of social constructivism to be its ability to bridge rationalist and reflectivity approaches. Conversely, social constructivists regard this as an unhelpful regression to positivist binary frameworks of analysis.\nC. Conventional constructivism refers to the earlier works of social constructivist theorists that are characterised by a rejection of positivist methodology. Critical constructivists challenge these theories, embracing positivist methodologies in their work.\nD. Social constructivism is best understood as a uniform approach to the construction of social identities and security; although distinctions exist within the field, these are not easily defined as distinctive separate approaches.\nAnswer:"," Social constructivism is best understood as a uniform approach to the construction of social identities and security; although distinctions exist within the field, these are not easily defined as distinctive separate approaches."],["Question: Which of the following represent a move away from traditional interpretations of security studies?\nChoices:\nA. Critical questioning.\nB. Realist logic.\nC. State-centric security analysis.\nD. All of these options.\nAnswer:"," Critical questioning."],["Question: Which of the following represent a move away from traditional interpretations of security studies?\nChoices:\nA. Critical questioning.\nB. Realist logic.\nC. State-centric security analysis.\nD. All of these options.\nAnswer:"," Realist logic."],["Question: Which of the following represent a move away from traditional interpretations of security studies?\nChoices:\nA. Critical questioning.\nB. Realist logic.\nC. State-centric security analysis.\nD. All of these options.\nAnswer:"," State-centric security analysis."],["Question: Which of the following represent a move away from traditional interpretations of security studies?\nChoices:\nA. Critical questioning.\nB. Realist logic.\nC. State-centric security analysis.\nD. All of these options.\nAnswer:"," All of these options."],["Question: Which of the following statements best describes our understanding of the term 'globalization'?\nChoices:\nA. Globalization refers to the process by which shared hegemonic values pervade societies across the globe, drawing them into an ideological community, most often based on the economic principles of capitalism.\nB. Best described as intensification of worldwide social relations and increasing interdependence, globalization is the result of the compression of space and time through the development of new technologies.\nC. Globalization is best described as the 'shrinking' of the global community, drawing people into closer contact with one another primarily at the economic and technical levels. This process began in the early 20th century and was based on the ideological expeditions that originated from western Europe.\nD. Globalization has occurred since the 1980s, originating in Western Europe as a centre of political power and technological advancement. The process is a direct result of technological advancement in communications and travel industries that facilitate the efficient transportation of physical objects, people and ideas across the globe.\nAnswer:"," Globalization refers to the process by which shared hegemonic values pervade societies across the globe, drawing them into an ideological community, most often based on the economic principles of capitalism."],["Question: Which of the following statements best describes our understanding of the term 'globalization'?\nChoices:\nA. Globalization refers to the process by which shared hegemonic values pervade societies across the globe, drawing them into an ideological community, most often based on the economic principles of capitalism.\nB. Best described as intensification of worldwide social relations and increasing interdependence, globalization is the result of the compression of space and time through the development of new technologies.\nC. Globalization is best described as the 'shrinking' of the global community, drawing people into closer contact with one another primarily at the economic and technical levels. This process began in the early 20th century and was based on the ideological expeditions that originated from western Europe.\nD. Globalization has occurred since the 1980s, originating in Western Europe as a centre of political power and technological advancement. The process is a direct result of technological advancement in communications and travel industries that facilitate the efficient transportation of physical objects, people and ideas across the globe.\nAnswer:"," Best described as intensification of worldwide social relations and increasing interdependence, globalization is the result of the compression of space and time through the development of new technologies."],["Question: Which of the following statements best describes our understanding of the term 'globalization'?\nChoices:\nA. Globalization refers to the process by which shared hegemonic values pervade societies across the globe, drawing them into an ideological community, most often based on the economic principles of capitalism.\nB. Best described as intensification of worldwide social relations and increasing interdependence, globalization is the result of the compression of space and time through the development of new technologies.\nC. Globalization is best described as the 'shrinking' of the global community, drawing people into closer contact with one another primarily at the economic and technical levels. This process began in the early 20th century and was based on the ideological expeditions that originated from western Europe.\nD. Globalization has occurred since the 1980s, originating in Western Europe as a centre of political power and technological advancement. The process is a direct result of technological advancement in communications and travel industries that facilitate the efficient transportation of physical objects, people and ideas across the globe.\nAnswer:"," Globalization is best described as the 'shrinking' of the global community, drawing people into closer contact with one another primarily at the economic and technical levels. This process began in the early 20th century and was based on the ideological expeditions that originated from western Europe."],["Question: Which of the following statements best describes our understanding of the term 'globalization'?\nChoices:\nA. Globalization refers to the process by which shared hegemonic values pervade societies across the globe, drawing them into an ideological community, most often based on the economic principles of capitalism.\nB. Best described as intensification of worldwide social relations and increasing interdependence, globalization is the result of the compression of space and time through the development of new technologies.\nC. Globalization is best described as the 'shrinking' of the global community, drawing people into closer contact with one another primarily at the economic and technical levels. This process began in the early 20th century and was based on the ideological expeditions that originated from western Europe.\nD. Globalization has occurred since the 1980s, originating in Western Europe as a centre of political power and technological advancement. The process is a direct result of technological advancement in communications and travel industries that facilitate the efficient transportation of physical objects, people and ideas across the globe.\nAnswer:"," Globalization has occurred since the 1980s, originating in Western Europe as a centre of political power and technological advancement. The process is a direct result of technological advancement in communications and travel industries that facilitate the efficient transportation of physical objects, people and ideas across the globe."],["Question: What is the relationship between culture and social constructivism?\nChoices:\nA. All of the below.\nB. Culture is the product of shared identity and interaction, although it is important in understanding the dynamics of social identity, its wider reference to security studies is largely disputed.\nC. Social constructivism does not regard culture as being an important feature to study, instead focusing on individualistic aspects of identity such as personal interests and ambition.\nD. Culture is commonly regarded as a set of practices that give meaning to shared experiences and actions; it can impact on how states see security and is crucial in constructing the values and rules that inform identity.\nAnswer:"," All of the below."],["Question: What is the relationship between culture and social constructivism?\nChoices:\nA. All of the below.\nB. Culture is the product of shared identity and interaction, although it is important in understanding the dynamics of social identity, its wider reference to security studies is largely disputed.\nC. Social constructivism does not regard culture as being an important feature to study, instead focusing on individualistic aspects of identity such as personal interests and ambition.\nD. Culture is commonly regarded as a set of practices that give meaning to shared experiences and actions; it can impact on how states see security and is crucial in constructing the values and rules that inform identity.\nAnswer:"," Culture is the product of shared identity and interaction, although it is important in understanding the dynamics of social identity, its wider reference to security studies is largely disputed."],["Question: What is the relationship between culture and social constructivism?\nChoices:\nA. All of the below.\nB. Culture is the product of shared identity and interaction, although it is important in understanding the dynamics of social identity, its wider reference to security studies is largely disputed.\nC. Social constructivism does not regard culture as being an important feature to study, instead focusing on individualistic aspects of identity such as personal interests and ambition.\nD. Culture is commonly regarded as a set of practices that give meaning to shared experiences and actions; it can impact on how states see security and is crucial in constructing the values and rules that inform identity.\nAnswer:"," Social constructivism does not regard culture as being an important feature to study, instead focusing on individualistic aspects of identity such as personal interests and ambition."],["Question: What is the relationship between culture and social constructivism?\nChoices:\nA. All of the below.\nB. Culture is the product of shared identity and interaction, although it is important in understanding the dynamics of social identity, its wider reference to security studies is largely disputed.\nC. Social constructivism does not regard culture as being an important feature to study, instead focusing on individualistic aspects of identity such as personal interests and ambition.\nD. Culture is commonly regarded as a set of practices that give meaning to shared experiences and actions; it can impact on how states see security and is crucial in constructing the values and rules that inform identity.\nAnswer:"," Culture is commonly regarded as a set of practices that give meaning to shared experiences and actions; it can impact on how states see security and is crucial in constructing the values and rules that inform identity."],["Question: In what ways might a society be threatened?\nChoices:\nA. Societies are threatened when their linguistic heritage and traditions are under attack. The inability to use and develop traditional language signifies the destruction of a society.\nB. Threats to societal security exist when a society regards its collective identity as being under question. Such circumstances include the suppression of expression and interference with a society's ability to reproduce itself across generations.\nC. Military threats to societies in the form of external aggression, mainly through de-population policies with the intent of preventing collective identities from being reproduced over generations.\nD. Migratory influxes into a host receiving state results in a shift in the composition of the population resulting in horizontal competition or vertical competition. This is not an outright threat to survival but part of wider uncontrollable processes of evolutionary identity.\nAnswer:"," Societies are threatened when their linguistic heritage and traditions are under attack. The inability to use and develop traditional language signifies the destruction of a society."],["Question: In what ways might a society be threatened?\nChoices:\nA. Societies are threatened when their linguistic heritage and traditions are under attack. The inability to use and develop traditional language signifies the destruction of a society.\nB. Threats to societal security exist when a society regards its collective identity as being under question. Such circumstances include the suppression of expression and interference with a society's ability to reproduce itself across generations.\nC. Military threats to societies in the form of external aggression, mainly through de-population policies with the intent of preventing collective identities from being reproduced over generations.\nD. Migratory influxes into a host receiving state results in a shift in the composition of the population resulting in horizontal competition or vertical competition. This is not an outright threat to survival but part of wider uncontrollable processes of evolutionary identity.\nAnswer:"," Threats to societal security exist when a society regards its collective identity as being under question. Such circumstances include the suppression of expression and interference with a society's ability to reproduce itself across generations."],["Question: In what ways might a society be threatened?\nChoices:\nA. Societies are threatened when their linguistic heritage and traditions are under attack. The inability to use and develop traditional language signifies the destruction of a society.\nB. Threats to societal security exist when a society regards its collective identity as being under question. Such circumstances include the suppression of expression and interference with a society's ability to reproduce itself across generations.\nC. Military threats to societies in the form of external aggression, mainly through de-population policies with the intent of preventing collective identities from being reproduced over generations.\nD. Migratory influxes into a host receiving state results in a shift in the composition of the population resulting in horizontal competition or vertical competition. This is not an outright threat to survival but part of wider uncontrollable processes of evolutionary identity.\nAnswer:"," Military threats to societies in the form of external aggression, mainly through de-population policies with the intent of preventing collective identities from being reproduced over generations."],["Question: In what ways might a society be threatened?\nChoices:\nA. Societies are threatened when their linguistic heritage and traditions are under attack. The inability to use and develop traditional language signifies the destruction of a society.\nB. Threats to societal security exist when a society regards its collective identity as being under question. Such circumstances include the suppression of expression and interference with a society's ability to reproduce itself across generations.\nC. Military threats to societies in the form of external aggression, mainly through de-population policies with the intent of preventing collective identities from being reproduced over generations.\nD. Migratory influxes into a host receiving state results in a shift in the composition of the population resulting in horizontal competition or vertical competition. This is not an outright threat to survival but part of wider uncontrollable processes of evolutionary identity.\nAnswer:"," Migratory influxes into a host receiving state results in a shift in the composition of the population resulting in horizontal competition or vertical competition. This is not an outright threat to survival but part of wider uncontrollable processes of evolutionary identity."],["Question: Which of the following phrases is not likely to indicate legitimacy in the new terminology of RMA?\nChoices:\nA. Surgical strike.\nB. Indiscriminate attack.\nC. Smart bomb.\nD. Precision target.\nAnswer:"," Surgical strike."],["Question: Which of the following phrases is not likely to indicate legitimacy in the new terminology of RMA?\nChoices:\nA. Surgical strike.\nB. Indiscriminate attack.\nC. Smart bomb.\nD. Precision target.\nAnswer:"," Indiscriminate attack."],["Question: Which of the following phrases is not likely to indicate legitimacy in the new terminology of RMA?\nChoices:\nA. Surgical strike.\nB. Indiscriminate attack.\nC. Smart bomb.\nD. Precision target.\nAnswer:"," Smart bomb."],["Question: Which of the following phrases is not likely to indicate legitimacy in the new terminology of RMA?\nChoices:\nA. Surgical strike.\nB. Indiscriminate attack.\nC. Smart bomb.\nD. Precision target.\nAnswer:"," Precision target."],["Question: When considering economic tools for security policy, which of the following is the odd one out?\nChoices:\nA. Withdrawal of economic trade rights with the domestic market.\nB. Export controls protecting technological advantage and further foreign policy objectives.\nC. Control of munitions and arms sales.\nD. Import restrictions to protect a domestic market from foreign goods.\nAnswer:"," Withdrawal of economic trade rights with the domestic market."],["Question: When considering economic tools for security policy, which of the following is the odd one out?\nChoices:\nA. Withdrawal of economic trade rights with the domestic market.\nB. Export controls protecting technological advantage and further foreign policy objectives.\nC. Control of munitions and arms sales.\nD. Import restrictions to protect a domestic market from foreign goods.\nAnswer:"," Export controls protecting technological advantage and further foreign policy objectives."],["Question: When considering economic tools for security policy, which of the following is the odd one out?\nChoices:\nA. Withdrawal of economic trade rights with the domestic market.\nB. Export controls protecting technological advantage and further foreign policy objectives.\nC. Control of munitions and arms sales.\nD. Import restrictions to protect a domestic market from foreign goods.\nAnswer:"," Control of munitions and arms sales."],["Question: When considering economic tools for security policy, which of the following is the odd one out?\nChoices:\nA. Withdrawal of economic trade rights with the domestic market.\nB. Export controls protecting technological advantage and further foreign policy objectives.\nC. Control of munitions and arms sales.\nD. Import restrictions to protect a domestic market from foreign goods.\nAnswer:"," Import restrictions to protect a domestic market from foreign goods."],["Question: How does the social constructivist approach account for the process of militarization?\nChoices:\nA. By regarding security as a socially constructed concept, constructivists assert that militarization is the result of governmental decisions based on shared values and cultural norms that underpin their conception of what constitutes a security risk. Accordingly, different governments will identify different threats and react in different ways.\nB. Social constructivists tend to focus on the population rather than military as an area for study, thus regarding the process of militarization largely in terms of its impact on human security.\nC. Social constructivists assert that the process follows a popular recognition of empirically definable threats; when it is recognized that an issue poses a real and valid threat, it warrants militarization.\nD. In their uniform advocacy of human security and adoption of a human-centric approach to security studies, social constructivists regard militarization as a process that is detrimental to achieving wider security goals and actively encourage the demilitarization of the security system.\nAnswer:"," By regarding security as a socially constructed concept, constructivists assert that militarization is the result of governmental decisions based on shared values and cultural norms that underpin their conception of what constitutes a security risk. Accordingly, different governments will identify different threats and react in different ways."],["Question: How does the social constructivist approach account for the process of militarization?\nChoices:\nA. By regarding security as a socially constructed concept, constructivists assert that militarization is the result of governmental decisions based on shared values and cultural norms that underpin their conception of what constitutes a security risk. Accordingly, different governments will identify different threats and react in different ways.\nB. Social constructivists tend to focus on the population rather than military as an area for study, thus regarding the process of militarization largely in terms of its impact on human security.\nC. Social constructivists assert that the process follows a popular recognition of empirically definable threats; when it is recognized that an issue poses a real and valid threat, it warrants militarization.\nD. In their uniform advocacy of human security and adoption of a human-centric approach to security studies, social constructivists regard militarization as a process that is detrimental to achieving wider security goals and actively encourage the demilitarization of the security system.\nAnswer:"," Social constructivists tend to focus on the population rather than military as an area for study, thus regarding the process of militarization largely in terms of its impact on human security."],["Question: How does the social constructivist approach account for the process of militarization?\nChoices:\nA. By regarding security as a socially constructed concept, constructivists assert that militarization is the result of governmental decisions based on shared values and cultural norms that underpin their conception of what constitutes a security risk. Accordingly, different governments will identify different threats and react in different ways.\nB. Social constructivists tend to focus on the population rather than military as an area for study, thus regarding the process of militarization largely in terms of its impact on human security.\nC. Social constructivists assert that the process follows a popular recognition of empirically definable threats; when it is recognized that an issue poses a real and valid threat, it warrants militarization.\nD. In their uniform advocacy of human security and adoption of a human-centric approach to security studies, social constructivists regard militarization as a process that is detrimental to achieving wider security goals and actively encourage the demilitarization of the security system.\nAnswer:"," Social constructivists assert that the process follows a popular recognition of empirically definable threats; when it is recognized that an issue poses a real and valid threat, it warrants militarization."],["Question: How does the social constructivist approach account for the process of militarization?\nChoices:\nA. By regarding security as a socially constructed concept, constructivists assert that militarization is the result of governmental decisions based on shared values and cultural norms that underpin their conception of what constitutes a security risk. Accordingly, different governments will identify different threats and react in different ways.\nB. Social constructivists tend to focus on the population rather than military as an area for study, thus regarding the process of militarization largely in terms of its impact on human security.\nC. Social constructivists assert that the process follows a popular recognition of empirically definable threats; when it is recognized that an issue poses a real and valid threat, it warrants militarization.\nD. In their uniform advocacy of human security and adoption of a human-centric approach to security studies, social constructivists regard militarization as a process that is detrimental to achieving wider security goals and actively encourage the demilitarization of the security system.\nAnswer:"," In their uniform advocacy of human security and adoption of a human-centric approach to security studies, social constructivists regard militarization as a process that is detrimental to achieving wider security goals and actively encourage the demilitarization of the security system."]]
[["Question: Murray thought that the 'underclass' consisted of people who:\nChoices:\nA. formed an inferior 'race' with low levels of intelligence\nB. lived morally unsound lives of crime and squalor\nC. were too reliant upon welfare benefits\nD. all of the above\nAnswer:"," formed an inferior 'race' with low levels of intelligence"],["Question: Murray thought that the 'underclass' consisted of people who:\nChoices:\nA. formed an inferior 'race' with low levels of intelligence\nB. lived morally unsound lives of crime and squalor\nC. were too reliant upon welfare benefits\nD. all of the above\nAnswer:"," lived morally unsound lives of crime and squalor"],["Question: Murray thought that the 'underclass' consisted of people who:\nChoices:\nA. formed an inferior 'race' with low levels of intelligence\nB. lived morally unsound lives of crime and squalor\nC. were too reliant upon welfare benefits\nD. all of the above\nAnswer:"," were too reliant upon welfare benefits"],["Question: Murray thought that the 'underclass' consisted of people who:\nChoices:\nA. formed an inferior 'race' with low levels of intelligence\nB. lived morally unsound lives of crime and squalor\nC. were too reliant upon welfare benefits\nD. all of the above\nAnswer:"," all of the above"],["Question: Bowlby's maternal deprivation thesis claimed that:\nChoices:\nA. mothers who are living in poverty cannot afford to give their children the resources that other children enjoy\nB. children deprived of an early, secure attachment to their mother are prone to suffer physically, intellectually and socially in later life\nC. 'mothering' is a socially constructed activity identified in the narratives of new mothers\nD. deprivation is something children inherit, usually through their mother's side\nAnswer:"," mothers who are living in poverty cannot afford to give their children the resources that other children enjoy"],["Question: Bowlby's maternal deprivation thesis claimed that:\nChoices:\nA. mothers who are living in poverty cannot afford to give their children the resources that other children enjoy\nB. children deprived of an early, secure attachment to their mother are prone to suffer physically, intellectually and socially in later life\nC. 'mothering' is a socially constructed activity identified in the narratives of new mothers\nD. deprivation is something children inherit, usually through their mother's side\nAnswer:"," children deprived of an early, secure attachment to their mother are prone to suffer physically, intellectually and socially in later life"],["Question: Bowlby's maternal deprivation thesis claimed that:\nChoices:\nA. mothers who are living in poverty cannot afford to give their children the resources that other children enjoy\nB. children deprived of an early, secure attachment to their mother are prone to suffer physically, intellectually and socially in later life\nC. 'mothering' is a socially constructed activity identified in the narratives of new mothers\nD. deprivation is something children inherit, usually through their mother's side\nAnswer:"," 'mothering' is a socially constructed activity identified in the narratives of new mothers"],["Question: Bowlby's maternal deprivation thesis claimed that:\nChoices:\nA. mothers who are living in poverty cannot afford to give their children the resources that other children enjoy\nB. children deprived of an early, secure attachment to their mother are prone to suffer physically, intellectually and socially in later life\nC. 'mothering' is a socially constructed activity identified in the narratives of new mothers\nD. deprivation is something children inherit, usually through their mother's side\nAnswer:"," deprivation is something children inherit, usually through their mother's side"],["Question: Scott (1991) introduced the term 'power elite' to describe:\nChoices:\nA. the ruling class, or bourgeoisie, who exploit the proletariat\nB. a capitalist class dependent on property ownership and advantaged life chances\nC. an alignment of classes with shared interests but no state power\nD. a state elite whose members are drawn overwhelmingly from a power bloc\nAnswer:"," the ruling class, or bourgeoisie, who exploit the proletariat"],["Question: Scott (1991) introduced the term 'power elite' to describe:\nChoices:\nA. the ruling class, or bourgeoisie, who exploit the proletariat\nB. a capitalist class dependent on property ownership and advantaged life chances\nC. an alignment of classes with shared interests but no state power\nD. a state elite whose members are drawn overwhelmingly from a power bloc\nAnswer:"," a capitalist class dependent on property ownership and advantaged life chances"],["Question: Scott (1991) introduced the term 'power elite' to describe:\nChoices:\nA. the ruling class, or bourgeoisie, who exploit the proletariat\nB. a capitalist class dependent on property ownership and advantaged life chances\nC. an alignment of classes with shared interests but no state power\nD. a state elite whose members are drawn overwhelmingly from a power bloc\nAnswer:"," an alignment of classes with shared interests but no state power"],["Question: Scott (1991) introduced the term 'power elite' to describe:\nChoices:\nA. the ruling class, or bourgeoisie, who exploit the proletariat\nB. a capitalist class dependent on property ownership and advantaged life chances\nC. an alignment of classes with shared interests but no state power\nD. a state elite whose members are drawn overwhelmingly from a power bloc\nAnswer:"," a state elite whose members are drawn overwhelmingly from a power bloc"],["Question: One of the ethical problems with covert participant observation is:\nChoices:\nA. not being able to write comprehensive fieldnotes or record conversations\nB. deceiving the respondents as to the reason for your presence\nC. observing people outside of their natural setting\nD. subjecting the participants to physical harm\nAnswer:"," not being able to write comprehensive fieldnotes or record conversations"],["Question: One of the ethical problems with covert participant observation is:\nChoices:\nA. not being able to write comprehensive fieldnotes or record conversations\nB. deceiving the respondents as to the reason for your presence\nC. observing people outside of their natural setting\nD. subjecting the participants to physical harm\nAnswer:"," deceiving the respondents as to the reason for your presence"],["Question: One of the ethical problems with covert participant observation is:\nChoices:\nA. not being able to write comprehensive fieldnotes or record conversations\nB. deceiving the respondents as to the reason for your presence\nC. observing people outside of their natural setting\nD. subjecting the participants to physical harm\nAnswer:"," observing people outside of their natural setting"],["Question: One of the ethical problems with covert participant observation is:\nChoices:\nA. not being able to write comprehensive fieldnotes or record conversations\nB. deceiving the respondents as to the reason for your presence\nC. observing people outside of their natural setting\nD. subjecting the participants to physical harm\nAnswer:"," subjecting the participants to physical harm"],["Question: Telework is a form of employment that involves:\nChoices:\nA. running one's own business through telephone helplines or hotlines\nB. working at home for an outside employer, using information technology\nC. babysitting and other jobs within a local network, through the informal economy\nD. combining non-manual work with the leisure activity of watching television\nAnswer:"," running one's own business through telephone helplines or hotlines"],["Question: Telework is a form of employment that involves:\nChoices:\nA. running one's own business through telephone helplines or hotlines\nB. working at home for an outside employer, using information technology\nC. babysitting and other jobs within a local network, through the informal economy\nD. combining non-manual work with the leisure activity of watching television\nAnswer:"," working at home for an outside employer, using information technology"],["Question: Telework is a form of employment that involves:\nChoices:\nA. running one's own business through telephone helplines or hotlines\nB. working at home for an outside employer, using information technology\nC. babysitting and other jobs within a local network, through the informal economy\nD. combining non-manual work with the leisure activity of watching television\nAnswer:"," babysitting and other jobs within a local network, through the informal economy"],["Question: Telework is a form of employment that involves:\nChoices:\nA. running one's own business through telephone helplines or hotlines\nB. working at home for an outside employer, using information technology\nC. babysitting and other jobs within a local network, through the informal economy\nD. combining non-manual work with the leisure activity of watching television\nAnswer:"," combining non-manual work with the leisure activity of watching television"],["Question: The theory of development which suggests that societies move from traditional to modern, industrial forms of organization is called:\nChoices:\nA. Westernization theory\nB. Modernization theory\nC. Industrialization theory\nD. Dependency theory\nAnswer:"," Westernization theory"],["Question: The theory of development which suggests that societies move from traditional to modern, industrial forms of organization is called:\nChoices:\nA. Westernization theory\nB. Modernization theory\nC. Industrialization theory\nD. Dependency theory\nAnswer:"," Modernization theory"],["Question: The theory of development which suggests that societies move from traditional to modern, industrial forms of organization is called:\nChoices:\nA. Westernization theory\nB. Modernization theory\nC. Industrialization theory\nD. Dependency theory\nAnswer:"," Industrialization theory"],["Question: The theory of development which suggests that societies move from traditional to modern, industrial forms of organization is called:\nChoices:\nA. Westernization theory\nB. Modernization theory\nC. Industrialization theory\nD. Dependency theory\nAnswer:"," Dependency theory"],["Question: In contemporary societies, social institutions are:\nChoices:\nA. highly specialized, interrelated sets of social practices\nB. disorganized social relations in a postmodern world\nC. virtual communities in cyberspace\nD. no longer relevant to sociology\nAnswer:"," highly specialized, interrelated sets of social practices"],["Question: In contemporary societies, social institutions are:\nChoices:\nA. highly specialized, interrelated sets of social practices\nB. disorganized social relations in a postmodern world\nC. virtual communities in cyberspace\nD. no longer relevant to sociology\nAnswer:"," disorganized social relations in a postmodern world"],["Question: In contemporary societies, social institutions are:\nChoices:\nA. highly specialized, interrelated sets of social practices\nB. disorganized social relations in a postmodern world\nC. virtual communities in cyberspace\nD. no longer relevant to sociology\nAnswer:"," virtual communities in cyberspace"],["Question: In contemporary societies, social institutions are:\nChoices:\nA. highly specialized, interrelated sets of social practices\nB. disorganized social relations in a postmodern world\nC. virtual communities in cyberspace\nD. no longer relevant to sociology\nAnswer:"," no longer relevant to sociology"],["Question: Becker proclaimed that cannabis use was:\nChoices:\nA. increasing throughout all sections of youth in the 1970s\nB. learned gradually through the social processes of a deviant career\nC. a dangerous pastime that young people should not be allowed to pursue\nD. not as enjoyable as other sociologists had suggested\nAnswer:"," increasing throughout all sections of youth in the 1970s"],["Question: Becker proclaimed that cannabis use was:\nChoices:\nA. increasing throughout all sections of youth in the 1970s\nB. learned gradually through the social processes of a deviant career\nC. a dangerous pastime that young people should not be allowed to pursue\nD. not as enjoyable as other sociologists had suggested\nAnswer:"," learned gradually through the social processes of a deviant career"],["Question: Becker proclaimed that cannabis use was:\nChoices:\nA. increasing throughout all sections of youth in the 1970s\nB. learned gradually through the social processes of a deviant career\nC. a dangerous pastime that young people should not be allowed to pursue\nD. not as enjoyable as other sociologists had suggested\nAnswer:"," a dangerous pastime that young people should not be allowed to pursue"],["Question: Becker proclaimed that cannabis use was:\nChoices:\nA. increasing throughout all sections of youth in the 1970s\nB. learned gradually through the social processes of a deviant career\nC. a dangerous pastime that young people should not be allowed to pursue\nD. not as enjoyable as other sociologists had suggested\nAnswer:"," not as enjoyable as other sociologists had suggested"],["Question: Judith Butler (1999) suggested that:\nChoices:\nA. sexual characteristics are the biological determinants of gender\nB. heterosexuality and homosexuality are essential, opposing identities\nC. the 'two-sex' model replaced the 'one-sex' model in the eighteenth century\nD. gender is performed through bodily gestures and styles to create 'sex'\nAnswer:"," sexual characteristics are the biological determinants of gender"],["Question: Judith Butler (1999) suggested that:\nChoices:\nA. sexual characteristics are the biological determinants of gender\nB. heterosexuality and homosexuality are essential, opposing identities\nC. the 'two-sex' model replaced the 'one-sex' model in the eighteenth century\nD. gender is performed through bodily gestures and styles to create 'sex'\nAnswer:"," heterosexuality and homosexuality are essential, opposing identities"],["Question: Judith Butler (1999) suggested that:\nChoices:\nA. sexual characteristics are the biological determinants of gender\nB. heterosexuality and homosexuality are essential, opposing identities\nC. the 'two-sex' model replaced the 'one-sex' model in the eighteenth century\nD. gender is performed through bodily gestures and styles to create 'sex'\nAnswer:"," the 'two-sex' model replaced the 'one-sex' model in the eighteenth century"],["Question: Judith Butler (1999) suggested that:\nChoices:\nA. sexual characteristics are the biological determinants of gender\nB. heterosexuality and homosexuality are essential, opposing identities\nC. the 'two-sex' model replaced the 'one-sex' model in the eighteenth century\nD. gender is performed through bodily gestures and styles to create 'sex'\nAnswer:"," gender is performed through bodily gestures and styles to create 'sex'"],["Question: Chodorow (1978) argued that gender socialization occurred through:\nChoices:\nA. both boys and girls being closely attached to their mothers, but then boys breaking away\nB. girls being attached to their mothers but then breaking away\nC. boys being attached to their fathers and girls to their mothers\nD. both boys and girls being closely attached to their fathers, but girls breaking away\nAnswer:"," both boys and girls being closely attached to their mothers, but then boys breaking away"],["Question: Chodorow (1978) argued that gender socialization occurred through:\nChoices:\nA. both boys and girls being closely attached to their mothers, but then boys breaking away\nB. girls being attached to their mothers but then breaking away\nC. boys being attached to their fathers and girls to their mothers\nD. both boys and girls being closely attached to their fathers, but girls breaking away\nAnswer:"," girls being attached to their mothers but then breaking away"],["Question: Chodorow (1978) argued that gender socialization occurred through:\nChoices:\nA. both boys and girls being closely attached to their mothers, but then boys breaking away\nB. girls being attached to their mothers but then breaking away\nC. boys being attached to their fathers and girls to their mothers\nD. both boys and girls being closely attached to their fathers, but girls breaking away\nAnswer:"," boys being attached to their fathers and girls to their mothers"],["Question: Chodorow (1978) argued that gender socialization occurred through:\nChoices:\nA. both boys and girls being closely attached to their mothers, but then boys breaking away\nB. girls being attached to their mothers but then breaking away\nC. boys being attached to their fathers and girls to their mothers\nD. both boys and girls being closely attached to their fathers, but girls breaking away\nAnswer:"," both boys and girls being closely attached to their fathers, but girls breaking away"]]
[["Question: Why might the 'Philadelphian System' be linked to the idea of American exceptionalism?\nChoices:\nA. It encouraged greater involvement in European politics\nB. It was designed as the antithesis of European politics\nC. It created a large standing army\nD. It encouraged the centralization of political power in the US\nAnswer:"," It encouraged greater involvement in European politics"],["Question: Why might the 'Philadelphian System' be linked to the idea of American exceptionalism?\nChoices:\nA. It encouraged greater involvement in European politics\nB. It was designed as the antithesis of European politics\nC. It created a large standing army\nD. It encouraged the centralization of political power in the US\nAnswer:"," It was designed as the antithesis of European politics"],["Question: Why might the 'Philadelphian System' be linked to the idea of American exceptionalism?\nChoices:\nA. It encouraged greater involvement in European politics\nB. It was designed as the antithesis of European politics\nC. It created a large standing army\nD. It encouraged the centralization of political power in the US\nAnswer:"," It created a large standing army"],["Question: Why might the 'Philadelphian System' be linked to the idea of American exceptionalism?\nChoices:\nA. It encouraged greater involvement in European politics\nB. It was designed as the antithesis of European politics\nC. It created a large standing army\nD. It encouraged the centralization of political power in the US\nAnswer:"," It encouraged the centralization of political power in the US"],["Question: Which is NOT a reason for why intergovernmental organizations are ineffective at promoting human rights?\nChoices:\nA. These organizations merely identify those states who already support human rights\nB. They cannot get enough information about which leaders will abuse their citizens\nC. These organizations have little ability to constrain abusive leaders\nD. None of the above\nAnswer:"," These organizations merely identify those states who already support human rights"],["Question: Which is NOT a reason for why intergovernmental organizations are ineffective at promoting human rights?\nChoices:\nA. These organizations merely identify those states who already support human rights\nB. They cannot get enough information about which leaders will abuse their citizens\nC. These organizations have little ability to constrain abusive leaders\nD. None of the above\nAnswer:"," They cannot get enough information about which leaders will abuse their citizens"],["Question: Which is NOT a reason for why intergovernmental organizations are ineffective at promoting human rights?\nChoices:\nA. These organizations merely identify those states who already support human rights\nB. They cannot get enough information about which leaders will abuse their citizens\nC. These organizations have little ability to constrain abusive leaders\nD. None of the above\nAnswer:"," These organizations have little ability to constrain abusive leaders"],["Question: Which is NOT a reason for why intergovernmental organizations are ineffective at promoting human rights?\nChoices:\nA. These organizations merely identify those states who already support human rights\nB. They cannot get enough information about which leaders will abuse their citizens\nC. These organizations have little ability to constrain abusive leaders\nD. None of the above\nAnswer:"," None of the above"],["Question: International development may be tied to the security of the state, why?\nChoices:\nA. Threats to the state centralize political and economic power, threatening state development\nB. Too many casualties drain the productive power of the state\nC. Threats to the state encourage socialism\nD. The two are correlated, but there is no causal effect\nAnswer:"," Threats to the state centralize political and economic power, threatening state development"],["Question: International development may be tied to the security of the state, why?\nChoices:\nA. Threats to the state centralize political and economic power, threatening state development\nB. Too many casualties drain the productive power of the state\nC. Threats to the state encourage socialism\nD. The two are correlated, but there is no causal effect\nAnswer:"," Too many casualties drain the productive power of the state"],["Question: International development may be tied to the security of the state, why?\nChoices:\nA. Threats to the state centralize political and economic power, threatening state development\nB. Too many casualties drain the productive power of the state\nC. Threats to the state encourage socialism\nD. The two are correlated, but there is no causal effect\nAnswer:"," Threats to the state encourage socialism"],["Question: International development may be tied to the security of the state, why?\nChoices:\nA. Threats to the state centralize political and economic power, threatening state development\nB. Too many casualties drain the productive power of the state\nC. Threats to the state encourage socialism\nD. The two are correlated, but there is no causal effect\nAnswer:"," The two are correlated, but there is no causal effect"],["Question: In American government, the power to declare war rests with\nChoices:\nA. the president of the United States.\nB. the secretary of defense.\nC. the chairman of the Joint Chiefs of Staff.\nD. Congress.\nAnswer:"," the president of the United States."],["Question: In American government, the power to declare war rests with\nChoices:\nA. the president of the United States.\nB. the secretary of defense.\nC. the chairman of the Joint Chiefs of Staff.\nD. Congress.\nAnswer:"," the secretary of defense."],["Question: In American government, the power to declare war rests with\nChoices:\nA. the president of the United States.\nB. the secretary of defense.\nC. the chairman of the Joint Chiefs of Staff.\nD. Congress.\nAnswer:"," the chairman of the Joint Chiefs of Staff."],["Question: In American government, the power to declare war rests with\nChoices:\nA. the president of the United States.\nB. the secretary of defense.\nC. the chairman of the Joint Chiefs of Staff.\nD. Congress.\nAnswer:"," Congress."],["Question: Why is NSC 68 seen as a turning point in US Cold War Foreign policy?\nChoices:\nA. It indicated the primacy of economic containment\nB. It indicated a desire to engage with the Soviet Union\nC. It indicated a shift towards military containment\nD. It dispensed with the idea of containment\nAnswer:"," It indicated the primacy of economic containment"],["Question: Why is NSC 68 seen as a turning point in US Cold War Foreign policy?\nChoices:\nA. It indicated the primacy of economic containment\nB. It indicated a desire to engage with the Soviet Union\nC. It indicated a shift towards military containment\nD. It dispensed with the idea of containment\nAnswer:"," It indicated a desire to engage with the Soviet Union"],["Question: Why is NSC 68 seen as a turning point in US Cold War Foreign policy?\nChoices:\nA. It indicated the primacy of economic containment\nB. It indicated a desire to engage with the Soviet Union\nC. It indicated a shift towards military containment\nD. It dispensed with the idea of containment\nAnswer:"," It indicated a shift towards military containment"],["Question: Why is NSC 68 seen as a turning point in US Cold War Foreign policy?\nChoices:\nA. It indicated the primacy of economic containment\nB. It indicated a desire to engage with the Soviet Union\nC. It indicated a shift towards military containment\nD. It dispensed with the idea of containment\nAnswer:"," It dispensed with the idea of containment"],["Question: What caused a public uproar involving the National Security Agency in 2005?\nChoices:\nA. Revelations that the NSA was monitoring the communications of American citizens without obtaining warrants\nB. A leaked memo that linked the events of September 11, 2001, with the Democratic National Committee\nC. Revelations that the NSA had tortured prisoners at Guantanamo, Cuba\nD. A scathing report condemning the George W. Bush administration for \"building a case for the war in Iraq on a quicksand foundation\"\nAnswer:"," Revelations that the NSA was monitoring the communications of American citizens without obtaining warrants"],["Question: What caused a public uproar involving the National Security Agency in 2005?\nChoices:\nA. Revelations that the NSA was monitoring the communications of American citizens without obtaining warrants\nB. A leaked memo that linked the events of September 11, 2001, with the Democratic National Committee\nC. Revelations that the NSA had tortured prisoners at Guantanamo, Cuba\nD. A scathing report condemning the George W. Bush administration for \"building a case for the war in Iraq on a quicksand foundation\"\nAnswer:"," A leaked memo that linked the events of September 11, 2001, with the Democratic National Committee"],["Question: What caused a public uproar involving the National Security Agency in 2005?\nChoices:\nA. Revelations that the NSA was monitoring the communications of American citizens without obtaining warrants\nB. A leaked memo that linked the events of September 11, 2001, with the Democratic National Committee\nC. Revelations that the NSA had tortured prisoners at Guantanamo, Cuba\nD. A scathing report condemning the George W. Bush administration for \"building a case for the war in Iraq on a quicksand foundation\"\nAnswer:"," Revelations that the NSA had tortured prisoners at Guantanamo, Cuba"],["Question: What caused a public uproar involving the National Security Agency in 2005?\nChoices:\nA. Revelations that the NSA was monitoring the communications of American citizens without obtaining warrants\nB. A leaked memo that linked the events of September 11, 2001, with the Democratic National Committee\nC. Revelations that the NSA had tortured prisoners at Guantanamo, Cuba\nD. A scathing report condemning the George W. Bush administration for \"building a case for the war in Iraq on a quicksand foundation\"\nAnswer:"," A scathing report condemning the George W. Bush administration for \"building a case for the war in Iraq on a quicksand foundation\""],["Question: What was the significance of the Gulf of Tonkin resolution?\nChoices:\nA. It allowed the US to intensify its involvement in Vietnam\nB. It illustrated the influence of public opinion on US foreign policy\nC. It enhanced Congressional control over the Vietnam War\nD. It curtailed US involvement in Vietnam\nAnswer:"," It allowed the US to intensify its involvement in Vietnam"],["Question: What was the significance of the Gulf of Tonkin resolution?\nChoices:\nA. It allowed the US to intensify its involvement in Vietnam\nB. It illustrated the influence of public opinion on US foreign policy\nC. It enhanced Congressional control over the Vietnam War\nD. It curtailed US involvement in Vietnam\nAnswer:"," It illustrated the influence of public opinion on US foreign policy"],["Question: What was the significance of the Gulf of Tonkin resolution?\nChoices:\nA. It allowed the US to intensify its involvement in Vietnam\nB. It illustrated the influence of public opinion on US foreign policy\nC. It enhanced Congressional control over the Vietnam War\nD. It curtailed US involvement in Vietnam\nAnswer:"," It enhanced Congressional control over the Vietnam War"],["Question: What was the significance of the Gulf of Tonkin resolution?\nChoices:\nA. It allowed the US to intensify its involvement in Vietnam\nB. It illustrated the influence of public opinion on US foreign policy\nC. It enhanced Congressional control over the Vietnam War\nD. It curtailed US involvement in Vietnam\nAnswer:"," It curtailed US involvement in Vietnam"],["Question: Why do realists tend to object to the influence of exceptionalism on American foreign policy?\nChoices:\nA. It leads to a diminished focus on collective security\nB. It diminishes the prospects for world government\nC. It enhances the prospects for world government\nD. It leads to a diminished focus on security, power and interest\nAnswer:"," It leads to a diminished focus on collective security"],["Question: Why do realists tend to object to the influence of exceptionalism on American foreign policy?\nChoices:\nA. It leads to a diminished focus on collective security\nB. It diminishes the prospects for world government\nC. It enhances the prospects for world government\nD. It leads to a diminished focus on security, power and interest\nAnswer:"," It diminishes the prospects for world government"],["Question: Why do realists tend to object to the influence of exceptionalism on American foreign policy?\nChoices:\nA. It leads to a diminished focus on collective security\nB. It diminishes the prospects for world government\nC. It enhances the prospects for world government\nD. It leads to a diminished focus on security, power and interest\nAnswer:"," It enhances the prospects for world government"],["Question: Why do realists tend to object to the influence of exceptionalism on American foreign policy?\nChoices:\nA. It leads to a diminished focus on collective security\nB. It diminishes the prospects for world government\nC. It enhances the prospects for world government\nD. It leads to a diminished focus on security, power and interest\nAnswer:"," It leads to a diminished focus on security, power and interest"],["Question: What did the Moscow Treaty on Strategic Offensive Reductions do?\nChoices:\nA. Required the United States and Russia to demobilize their armies\nB. Required the United States and Russia to dismantle a significant number of their nuclear weapons\nC. Prohibited the acquisition of new military bases\nD. Prohibited short-range nuclear weapons\nAnswer:"," Required the United States and Russia to demobilize their armies"],["Question: What did the Moscow Treaty on Strategic Offensive Reductions do?\nChoices:\nA. Required the United States and Russia to demobilize their armies\nB. Required the United States and Russia to dismantle a significant number of their nuclear weapons\nC. Prohibited the acquisition of new military bases\nD. Prohibited short-range nuclear weapons\nAnswer:"," Required the United States and Russia to dismantle a significant number of their nuclear weapons"],["Question: What did the Moscow Treaty on Strategic Offensive Reductions do?\nChoices:\nA. Required the United States and Russia to demobilize their armies\nB. Required the United States and Russia to dismantle a significant number of their nuclear weapons\nC. Prohibited the acquisition of new military bases\nD. Prohibited short-range nuclear weapons\nAnswer:"," Prohibited the acquisition of new military bases"],["Question: What did the Moscow Treaty on Strategic Offensive Reductions do?\nChoices:\nA. Required the United States and Russia to demobilize their armies\nB. Required the United States and Russia to dismantle a significant number of their nuclear weapons\nC. Prohibited the acquisition of new military bases\nD. Prohibited short-range nuclear weapons\nAnswer:"," Prohibited short-range nuclear weapons"],["Question: What was the Marshall plan?\nChoices:\nA. A plan designed to aid the economy recovery of Europe\nB. An attempt to diminish the potential attraction of the Soviet system to Europeans\nC. An aid programme that embedded US influence in Europe\nD. All of the above\nAnswer:"," A plan designed to aid the economy recovery of Europe"],["Question: What was the Marshall plan?\nChoices:\nA. A plan designed to aid the economy recovery of Europe\nB. An attempt to diminish the potential attraction of the Soviet system to Europeans\nC. An aid programme that embedded US influence in Europe\nD. All of the above\nAnswer:"," An attempt to diminish the potential attraction of the Soviet system to Europeans"],["Question: What was the Marshall plan?\nChoices:\nA. A plan designed to aid the economy recovery of Europe\nB. An attempt to diminish the potential attraction of the Soviet system to Europeans\nC. An aid programme that embedded US influence in Europe\nD. All of the above\nAnswer:"," An aid programme that embedded US influence in Europe"],["Question: What was the Marshall plan?\nChoices:\nA. A plan designed to aid the economy recovery of Europe\nB. An attempt to diminish the potential attraction of the Soviet system to Europeans\nC. An aid programme that embedded US influence in Europe\nD. All of the above\nAnswer:"," All of the above"]]
[["Question: How are antibody producing cells stimulated?\nChoices:\nA. Interacting with a virus short peptide\nB. Interacting with a T helper cell.\nC. Interacting with a plasma cell\nD. Interacting with a virus infected cell\nAnswer:"," Interacting with a virus short peptide"],["Question: How are antibody producing cells stimulated?\nChoices:\nA. Interacting with a virus short peptide\nB. Interacting with a T helper cell.\nC. Interacting with a plasma cell\nD. Interacting with a virus infected cell\nAnswer:"," Interacting with a T helper cell."],["Question: How are antibody producing cells stimulated?\nChoices:\nA. Interacting with a virus short peptide\nB. Interacting with a T helper cell.\nC. Interacting with a plasma cell\nD. Interacting with a virus infected cell\nAnswer:"," Interacting with a plasma cell"],["Question: How are antibody producing cells stimulated?\nChoices:\nA. Interacting with a virus short peptide\nB. Interacting with a T helper cell.\nC. Interacting with a plasma cell\nD. Interacting with a virus infected cell\nAnswer:"," Interacting with a virus infected cell"],["Question: Of the following factors, which are the most important factors for virus spread and infection?\nChoices:\nA. Age\nB. Sex\nC. Genetic factors\nD. Travel\nAnswer:"," Age"],["Question: Of the following factors, which are the most important factors for virus spread and infection?\nChoices:\nA. Age\nB. Sex\nC. Genetic factors\nD. Travel\nAnswer:"," Sex"],["Question: Of the following factors, which are the most important factors for virus spread and infection?\nChoices:\nA. Age\nB. Sex\nC. Genetic factors\nD. Travel\nAnswer:"," Genetic factors"],["Question: Of the following factors, which are the most important factors for virus spread and infection?\nChoices:\nA. Age\nB. Sex\nC. Genetic factors\nD. Travel\nAnswer:"," Travel"],["Question: Viruses have encouraged us to change our world, as we have now:\nChoices:\nA. Eradicated smallpox\nB. Eradicated polio\nC. Increased hygiene\nD. A better understanding of how cellular genes aid virus replication and so become a target for new drugs\nAnswer:"," Eradicated smallpox"],["Question: Viruses have encouraged us to change our world, as we have now:\nChoices:\nA. Eradicated smallpox\nB. Eradicated polio\nC. Increased hygiene\nD. A better understanding of how cellular genes aid virus replication and so become a target for new drugs\nAnswer:"," Eradicated polio"],["Question: Viruses have encouraged us to change our world, as we have now:\nChoices:\nA. Eradicated smallpox\nB. Eradicated polio\nC. Increased hygiene\nD. A better understanding of how cellular genes aid virus replication and so become a target for new drugs\nAnswer:"," Increased hygiene"],["Question: Viruses have encouraged us to change our world, as we have now:\nChoices:\nA. Eradicated smallpox\nB. Eradicated polio\nC. Increased hygiene\nD. A better understanding of how cellular genes aid virus replication and so become a target for new drugs\nAnswer:"," A better understanding of how cellular genes aid virus replication and so become a target for new drugs"],["Question: The influenza virus is mainly controlled in special \"risk\" sectors by:\nChoices:\nA. Hygiene\nB. Vaccination\nC. Antiviral drugs\nD. Humanised monoclonal antibodies\nAnswer:"," Hygiene"],["Question: The influenza virus is mainly controlled in special \"risk\" sectors by:\nChoices:\nA. Hygiene\nB. Vaccination\nC. Antiviral drugs\nD. Humanised monoclonal antibodies\nAnswer:"," Vaccination"],["Question: The influenza virus is mainly controlled in special \"risk\" sectors by:\nChoices:\nA. Hygiene\nB. Vaccination\nC. Antiviral drugs\nD. Humanised monoclonal antibodies\nAnswer:"," Antiviral drugs"],["Question: The influenza virus is mainly controlled in special \"risk\" sectors by:\nChoices:\nA. Hygiene\nB. Vaccination\nC. Antiviral drugs\nD. Humanised monoclonal antibodies\nAnswer:"," Humanised monoclonal antibodies"],["Question: In HIV-associated tuberculosis cases, treatment with antiretrovirals should begin:\nChoices:\nA. Before antiretroviral drugs are started\nB. After antiretroviral drugs are started\nC. Concurrently with antiretroviral drugs\nD. Doesn\u2019t make any difference\nAnswer:"," Before antiretroviral drugs are started"],["Question: In HIV-associated tuberculosis cases, treatment with antiretrovirals should begin:\nChoices:\nA. Before antiretroviral drugs are started\nB. After antiretroviral drugs are started\nC. Concurrently with antiretroviral drugs\nD. Doesn\u2019t make any difference\nAnswer:"," After antiretroviral drugs are started"],["Question: In HIV-associated tuberculosis cases, treatment with antiretrovirals should begin:\nChoices:\nA. Before antiretroviral drugs are started\nB. After antiretroviral drugs are started\nC. Concurrently with antiretroviral drugs\nD. Doesn\u2019t make any difference\nAnswer:"," Concurrently with antiretroviral drugs"],["Question: In HIV-associated tuberculosis cases, treatment with antiretrovirals should begin:\nChoices:\nA. Before antiretroviral drugs are started\nB. After antiretroviral drugs are started\nC. Concurrently with antiretroviral drugs\nD. Doesn\u2019t make any difference\nAnswer:"," Doesn\u2019t make any difference"],["Question: The first acquired immune cell to respond defensively to HIV infection is:\nChoices:\nA. CD4+\nB. CD8+\nC. CD57\nD. NK cells\nAnswer:"," CD4+"],["Question: The first acquired immune cell to respond defensively to HIV infection is:\nChoices:\nA. CD4+\nB. CD8+\nC. CD57\nD. NK cells\nAnswer:"," CD8+"],["Question: The first acquired immune cell to respond defensively to HIV infection is:\nChoices:\nA. CD4+\nB. CD8+\nC. CD57\nD. NK cells\nAnswer:"," CD57"],["Question: The first acquired immune cell to respond defensively to HIV infection is:\nChoices:\nA. CD4+\nB. CD8+\nC. CD57\nD. NK cells\nAnswer:"," NK cells"],["Question: Positive stranded RNA viruses have which of the following characteristics?\nChoices:\nA. Their genome RNA can be translated directly as mRNA\nB. They have to transcribe their genome RNA to a mirror image copy as a mRNA\nC. This genome is circular\nD. Their RNA genome is segmented\nAnswer:"," Their genome RNA can be translated directly as mRNA"],["Question: Positive stranded RNA viruses have which of the following characteristics?\nChoices:\nA. Their genome RNA can be translated directly as mRNA\nB. They have to transcribe their genome RNA to a mirror image copy as a mRNA\nC. This genome is circular\nD. Their RNA genome is segmented\nAnswer:"," They have to transcribe their genome RNA to a mirror image copy as a mRNA"],["Question: Positive stranded RNA viruses have which of the following characteristics?\nChoices:\nA. Their genome RNA can be translated directly as mRNA\nB. They have to transcribe their genome RNA to a mirror image copy as a mRNA\nC. This genome is circular\nD. Their RNA genome is segmented\nAnswer:"," This genome is circular"],["Question: Positive stranded RNA viruses have which of the following characteristics?\nChoices:\nA. Their genome RNA can be translated directly as mRNA\nB. They have to transcribe their genome RNA to a mirror image copy as a mRNA\nC. This genome is circular\nD. Their RNA genome is segmented\nAnswer:"," Their RNA genome is segmented"],["Question: Which of the following are goals of vaccination?\nChoices:\nA. Prevent infection\nB. Prevent disease\nC. Prevent transmission\nD. All of the above\nAnswer:"," Prevent infection"],["Question: Which of the following are goals of vaccination?\nChoices:\nA. Prevent infection\nB. Prevent disease\nC. Prevent transmission\nD. All of the above\nAnswer:"," Prevent disease"],["Question: Which of the following are goals of vaccination?\nChoices:\nA. Prevent infection\nB. Prevent disease\nC. Prevent transmission\nD. All of the above\nAnswer:"," Prevent transmission"],["Question: Which of the following are goals of vaccination?\nChoices:\nA. Prevent infection\nB. Prevent disease\nC. Prevent transmission\nD. All of the above\nAnswer:"," All of the above"],["Question: What disease do herpes viruses not cause?\nChoices:\nA. Infantile paralysis\nB. Encephalitis\nC. Sexually transmitted disease\nD. Cancer\nAnswer:"," Infantile paralysis"],["Question: What disease do herpes viruses not cause?\nChoices:\nA. Infantile paralysis\nB. Encephalitis\nC. Sexually transmitted disease\nD. Cancer\nAnswer:"," Encephalitis"],["Question: What disease do herpes viruses not cause?\nChoices:\nA. Infantile paralysis\nB. Encephalitis\nC. Sexually transmitted disease\nD. Cancer\nAnswer:"," Sexually transmitted disease"],["Question: What disease do herpes viruses not cause?\nChoices:\nA. Infantile paralysis\nB. Encephalitis\nC. Sexually transmitted disease\nD. Cancer\nAnswer:"," Cancer"],["Question: Which of the following is a special feature of the rabies vaccine?\nChoices:\nA. The vaccine has not changed since the time of L. Pasteur\nB. The original air dried spinal cord of infected rabbits was a killed vaccine\nC. The vaccine still needs 16 doses given into the peritoneal cavity\nD. The modern rabies vaccine is grown in human diploid cells from an aborted embryo\nAnswer:"," The vaccine has not changed since the time of L. Pasteur"],["Question: Which of the following is a special feature of the rabies vaccine?\nChoices:\nA. The vaccine has not changed since the time of L. Pasteur\nB. The original air dried spinal cord of infected rabbits was a killed vaccine\nC. The vaccine still needs 16 doses given into the peritoneal cavity\nD. The modern rabies vaccine is grown in human diploid cells from an aborted embryo\nAnswer:"," The original air dried spinal cord of infected rabbits was a killed vaccine"],["Question: Which of the following is a special feature of the rabies vaccine?\nChoices:\nA. The vaccine has not changed since the time of L. Pasteur\nB. The original air dried spinal cord of infected rabbits was a killed vaccine\nC. The vaccine still needs 16 doses given into the peritoneal cavity\nD. The modern rabies vaccine is grown in human diploid cells from an aborted embryo\nAnswer:"," The vaccine still needs 16 doses given into the peritoneal cavity"],["Question: Which of the following is a special feature of the rabies vaccine?\nChoices:\nA. The vaccine has not changed since the time of L. Pasteur\nB. The original air dried spinal cord of infected rabbits was a killed vaccine\nC. The vaccine still needs 16 doses given into the peritoneal cavity\nD. The modern rabies vaccine is grown in human diploid cells from an aborted embryo\nAnswer:"," The modern rabies vaccine is grown in human diploid cells from an aborted embryo"]]
[["Question: Rome claimed that their bishop (pope) was the director successor of which leader?\nChoices:\nA. Peter\nB. Paul\nC. Jesus\nD. Matthew\nAnswer:"," Peter"],["Question: Rome claimed that their bishop (pope) was the director successor of which leader?\nChoices:\nA. Peter\nB. Paul\nC. Jesus\nD. Matthew\nAnswer:"," Paul"],["Question: Rome claimed that their bishop (pope) was the director successor of which leader?\nChoices:\nA. Peter\nB. Paul\nC. Jesus\nD. Matthew\nAnswer:"," Jesus"],["Question: Rome claimed that their bishop (pope) was the director successor of which leader?\nChoices:\nA. Peter\nB. Paul\nC. Jesus\nD. Matthew\nAnswer:"," Matthew"],["Question: Which are the synoptic Gospels?\nChoices:\nA. Peter, John, Mark\nB. Matthew, Mark, John\nC. Matthew, Mark, Luke\nD. John, Luke, Mark\nAnswer:"," Peter, John, Mark"],["Question: Which are the synoptic Gospels?\nChoices:\nA. Peter, John, Mark\nB. Matthew, Mark, John\nC. Matthew, Mark, Luke\nD. John, Luke, Mark\nAnswer:"," Matthew, Mark, John"],["Question: Which are the synoptic Gospels?\nChoices:\nA. Peter, John, Mark\nB. Matthew, Mark, John\nC. Matthew, Mark, Luke\nD. John, Luke, Mark\nAnswer:"," Matthew, Mark, Luke"],["Question: Which are the synoptic Gospels?\nChoices:\nA. Peter, John, Mark\nB. Matthew, Mark, John\nC. Matthew, Mark, Luke\nD. John, Luke, Mark\nAnswer:"," John, Luke, Mark"],["Question: Which Jaina group only allows women to lead a life of semi-renunciation?\nChoices:\nA. Svetambara\nB. Jina\nC. Agama\nD. Digambara\nAnswer:"," Svetambara"],["Question: Which Jaina group only allows women to lead a life of semi-renunciation?\nChoices:\nA. Svetambara\nB. Jina\nC. Agama\nD. Digambara\nAnswer:"," Jina"],["Question: Which Jaina group only allows women to lead a life of semi-renunciation?\nChoices:\nA. Svetambara\nB. Jina\nC. Agama\nD. Digambara\nAnswer:"," Agama"],["Question: Which Jaina group only allows women to lead a life of semi-renunciation?\nChoices:\nA. Svetambara\nB. Jina\nC. Agama\nD. Digambara\nAnswer:"," Digambara"],["Question: What is the English title for the divination text also known as the Yijing?\nChoices:\nA. The Classic of Documents\nB. The Lotus Sutra\nC. The Flower Garland Sutra\nD. The Classic of Changes\nAnswer:"," The Classic of Documents"],["Question: What is the English title for the divination text also known as the Yijing?\nChoices:\nA. The Classic of Documents\nB. The Lotus Sutra\nC. The Flower Garland Sutra\nD. The Classic of Changes\nAnswer:"," The Lotus Sutra"],["Question: What is the English title for the divination text also known as the Yijing?\nChoices:\nA. The Classic of Documents\nB. The Lotus Sutra\nC. The Flower Garland Sutra\nD. The Classic of Changes\nAnswer:"," The Flower Garland Sutra"],["Question: What is the English title for the divination text also known as the Yijing?\nChoices:\nA. The Classic of Documents\nB. The Lotus Sutra\nC. The Flower Garland Sutra\nD. The Classic of Changes\nAnswer:"," The Classic of Changes"],["Question: In Jainism, what is the cycle that one must liberate oneself from?\nChoices:\nA. Punya\nB. Samsara\nC. Samayika\nD. Jiva\nAnswer:"," Punya"],["Question: In Jainism, what is the cycle that one must liberate oneself from?\nChoices:\nA. Punya\nB. Samsara\nC. Samayika\nD. Jiva\nAnswer:"," Samsara"],["Question: In Jainism, what is the cycle that one must liberate oneself from?\nChoices:\nA. Punya\nB. Samsara\nC. Samayika\nD. Jiva\nAnswer:"," Samayika"],["Question: In Jainism, what is the cycle that one must liberate oneself from?\nChoices:\nA. Punya\nB. Samsara\nC. Samayika\nD. Jiva\nAnswer:"," Jiva"],["Question: What is the most important prayer in Judaism?\nChoices:\nA. The Shema\nB. The Sefirot\nC. Deuteronomy\nD. The Decalogue\nAnswer:"," The Shema"],["Question: What is the most important prayer in Judaism?\nChoices:\nA. The Shema\nB. The Sefirot\nC. Deuteronomy\nD. The Decalogue\nAnswer:"," The Sefirot"],["Question: What is the most important prayer in Judaism?\nChoices:\nA. The Shema\nB. The Sefirot\nC. Deuteronomy\nD. The Decalogue\nAnswer:"," Deuteronomy"],["Question: What is the most important prayer in Judaism?\nChoices:\nA. The Shema\nB. The Sefirot\nC. Deuteronomy\nD. The Decalogue\nAnswer:"," The Decalogue"],["Question: What is a mohel?\nChoices:\nA. A ritual circumciser\nB. A type of oil lame\nC. A teacher\nD. A covenant\nAnswer:"," A ritual circumciser"],["Question: What is a mohel?\nChoices:\nA. A ritual circumciser\nB. A type of oil lame\nC. A teacher\nD. A covenant\nAnswer:"," A type of oil lame"],["Question: What is a mohel?\nChoices:\nA. A ritual circumciser\nB. A type of oil lame\nC. A teacher\nD. A covenant\nAnswer:"," A teacher"],["Question: What is a mohel?\nChoices:\nA. A ritual circumciser\nB. A type of oil lame\nC. A teacher\nD. A covenant\nAnswer:"," A covenant"],["Question: Who is the eighth-century CE female poet worshipped throughout many South Indian temples dedicated to Vishnu?\nChoices:\nA. Andal\nB. Devi\nC. Ganga\nD. Kali\nAnswer:"," Andal"],["Question: Who is the eighth-century CE female poet worshipped throughout many South Indian temples dedicated to Vishnu?\nChoices:\nA. Andal\nB. Devi\nC. Ganga\nD. Kali\nAnswer:"," Devi"],["Question: Who is the eighth-century CE female poet worshipped throughout many South Indian temples dedicated to Vishnu?\nChoices:\nA. Andal\nB. Devi\nC. Ganga\nD. Kali\nAnswer:"," Ganga"],["Question: Who is the eighth-century CE female poet worshipped throughout many South Indian temples dedicated to Vishnu?\nChoices:\nA. Andal\nB. Devi\nC. Ganga\nD. Kali\nAnswer:"," Kali"],["Question: The classic text Daodejing is known by what title in English?\nChoices:\nA. Classic of Changes\nB. Classic of the Way and Power\nC. Classic of Women\nD. Classic of Philosophy\nAnswer:"," Classic of Changes"],["Question: The classic text Daodejing is known by what title in English?\nChoices:\nA. Classic of Changes\nB. Classic of the Way and Power\nC. Classic of Women\nD. Classic of Philosophy\nAnswer:"," Classic of the Way and Power"],["Question: The classic text Daodejing is known by what title in English?\nChoices:\nA. Classic of Changes\nB. Classic of the Way and Power\nC. Classic of Women\nD. Classic of Philosophy\nAnswer:"," Classic of Women"],["Question: The classic text Daodejing is known by what title in English?\nChoices:\nA. Classic of Changes\nB. Classic of the Way and Power\nC. Classic of Women\nD. Classic of Philosophy\nAnswer:"," Classic of Philosophy"],["Question: What is bhakti often translated as?\nChoices:\nA. Gods\nB. Yoga\nC. Devotion\nD. Religion\nAnswer:"," Gods"],["Question: What is bhakti often translated as?\nChoices:\nA. Gods\nB. Yoga\nC. Devotion\nD. Religion\nAnswer:"," Yoga"],["Question: What is bhakti often translated as?\nChoices:\nA. Gods\nB. Yoga\nC. Devotion\nD. Religion\nAnswer:"," Devotion"],["Question: What is bhakti often translated as?\nChoices:\nA. Gods\nB. Yoga\nC. Devotion\nD. Religion\nAnswer:"," Religion"]]