Skip to main content

亚裔是两党都讨厌的一根刺

 发信人: kyokusanagi (KOF97), 信区: USANews
标  题: 亚裔是两党都讨厌的一根刺
发信站: BBS 未名空间站 (Thu Apr 15 10:52:24 2021, 美东)

从GOP看
白人至上主义基本都是共和党的,基本没有民主党
这些人特别是底层白人构成川普的基本盘,自然不待见亚裔
另外是拥枪主义者和反堕胎的,也和大多数亚裔尿不到一壶

从DEM看
亚裔的存在破坏了他们“凡是穷苦都因肤色”的基本宣传大纲
不得已才发明了under-representative-minority这个词
意思就是除了亚裔外的少数族裔

亚裔阻碍了他们和白人至上的斗争
这也是亚裔和其他少数族裔矛盾的根源所在

亚裔少的时候还好,一根小刺忍一忍就过去了
当亚裔数量越来越多,矛盾就会越发凸显
但是目前也没有什么特别好解决方法,因为亚裔的存在实在太特殊了

GOP的解决方案是全赶出去Go back home
DEM的解决方案是AA,亚裔让利给黑墨

目前看起来AA还能接受
否则你还能有什么更好的解决方案吗?

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...