Cond + Weaken - 1. The theory of military deterrence was...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
1. The theory of military deterrence was based on a simple psychological truth, that fear of retaliation makes a would-be aggressor nation hesitate before attacking and is often sufficient to deter it altogether from attacking. Clearly, then to maintain military deterrence, a nation would have to believed to have retaliatory power so great that a potential aggressor nation would have reason to think that it could not defend itself against such retaliation. If the statements above are true, which one of the following can be properly inferred? (A) A would-be aggressor nation can be deterred from attacking only if it has certain knowledge that it would be destroyed in retaliation by the country it attacks. (B) A nation will not attack another nation if it believes that its own retaliatory power surpasses that of the other nation. (C) One nation’s failing to attack another establishes that the nation that fails to attack believes that it could not withstand a retaliatory attack from the other nation. (D) It is in the interests of a nation that seeks deterrence and has unsurpassed military power to let potential aggressors against it become aware of its power of retaliatory attack. (E) Maintaining maximum deterrence from aggression by other nations requires that a nation maintain a retaliatory force greater than that of any other nation. 2. Computer operating system software has become increasingly standardized. But when a large business with multiple, linked computer systems uses identical operating system software on all of its computers, a computer vandal who gains access to one computer automatically has access to the data on all the computers. Using a program known as a “virus,” the vandal can then destroy much of the data on all the computers. If such a business introduced minor variations into its operating system software, unauthorized access to all the computers at the same time could be virtually eliminated. Furthermore variations in operating system software can be created without any lose of computer compatibility to the business. Therefore, it is advisable for businesses to implement such variations. Which one of the following, if true, supports the conclusion in the passage? (A) Standardization of computer operating system software has increased computer compatibility among different businesses. (B) Correcting any damage resulting from an invasion by a computer virus program is more expensive than preventing the damage. (C) It is not costly for a business to maintain incompatible computer operating systems. (D) There are other kinds of destructive computer programs that do not depend on inter-computer links. (E) Not all businesses need to share date among their internal computer systems. 3.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/23/2011 for the course CAREER DEV 101 taught by Professor Bruneil during the Spring '09 term at American Dubai.

Page1 / 5

Cond + Weaken - 1. The theory of military deterrence was...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online