_____________ theories examine patriarchy and the marginalization and repression of women and children.
a) Conflict theories
b) Marxist theories
c) Feminist theories
d) Learning theories
c) Feminist theories
You might also like to view...
Which of the following eliminates possible pretest reactivity by studying both an experimental and a control group after the experimental group has been exposed to some treatment?
a. Solomon four-group design b. two-group ex post facto design c. counterbalanced design d. interrupted time-series design
Which of the following is not a characteristic of the "Hacker Ethic"?
a. Computers can change your life for the better. b. Hackers should not be judged by their hacking. c. All information should be free. d. You can create art and beauty on a computer.
An ___________ can be defined as anyone who provides information about a criminal case, but who is not a complainant, witness, or victim
Informants can be either concerned citizens or ruthless criminals, but in many cases they are seeking some benefit for their testimony. Fill in the blank(s) with correct word
In 1979, Dan White was convicted of voluntary manslaughter when he used the _________ defense
Fill in the blank(s) with correct word