Skip to main content

美国的歧视和中国歧视的区别

在美国华人所受到的歧视基本都是精神层面的,
比如路遇个混混喊你一声chink,或者本土出生有
college degree的人嘲笑你对美国文化一无所知,
像饭店里吃饭端盘子这类的。
中国不但有精神层面的歧视,而且有物质方面的歧视。
精神上的,比如说城里人歧视农村人,大城市歧视小
城市,北京歧视周边,上海歧视全国。
更重要的是中共伪政权制定了一系列法律从各个层面
上对于中国公民进行歧视,并且对于种种歧视社会性
行为听之任之。这些都属于影响一个人就业、收入、
生活的根本问题。
比如,很多公司招收毕业生只考虑男性,不考虑女性;
招女公务员要检验乳房大小;找工作要本地户口;高
考招生要对教育资源丰富的大城市特别是本地学生降
低分数线。
多了去了,举不胜举。

我见过最可笑的一个例子:外地女子嫁给北京男子需
要结婚10年以上才能办北京户口,并且婚内所生的孩
子十年内也不能上北京户口。上学就业就医都有严重
的障碍。要知道随便一个任意国家的人,哪怕是非法
移民,嫁给美国公民的话只要三个月就拿到绿卡了。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...