1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mina [271]
4 years ago
14

According to Robert Merton's strain theory, the term _______ correctly describes the behavior of a radical activist who rejects

just about everything in the existing society in favor of some alternative system. a. rebel b. retreatist c. ritualist d. innovator
Social Studies
1 answer:
olga55 [171]4 years ago
3 0

Answer:

Option A: Rebel

Explanation:

The strain theory states that society puts pressure on individuals to achieve socially accepted goals, though they lack the means.

It states people may deviate or rebel if there is an inconsistency between culturally defined goals and the accessible means to obtain those goals. This discrepancy can cause strain that can lead to the crime, violence, and murder that are the effects of rebellion.

You might be interested in
Frito-Lays manufacturing plant is in what city and state
andreyandreev [35.5K]
Plano, Texas is their headquarters.
6 0
3 years ago
For whom or what morality apply?
Deffense [45]

Question :

For whom or what morality apply?

Answer:

concerning the distinction between right and wrong or good and bad behavior.

Hope This Helps :)

4 0
3 years ago
The Indian conflicts led to well-organized ______ in every colony.
erica [24]

Answer: militias

Explanation:

                                                               

7 0
3 years ago
An economic system in which companies compete for profits is known as
Yuliya22 [10]

Answer:

capitalism

Explanation:

4 0
3 years ago
Read 2 more answers
One personal security safeguard is to take security seriously. another important security safeguard is to​ ________.
Daniel [21]
I believe the answer is: Use multiple password
These days, many hackers have develop a software to extracting our password by trying the potential combinations through algorithm.
Using multiple passwords would substantially extend the time needed for the software to finish since it need to tried huge amount of combination.
6 0
3 years ago
Other questions:
  • To participate in international trade, nations have to determine the value of their currency in relation to another nation's cur
    7·1 answer
  • An approach which is concerned with description and explanation of changes within an individual and between individuals from con
    6·1 answer
  • In 2012 how many members were in the cabinet
    8·1 answer
  • A dog has learned to salivate to the sound of a bell because it was repeatedly associated with food. Interestingly, even though
    11·1 answer
  • It was Marisol's first day at work. At first she was very nervous, but when she was introduced to her cubicle neighbor, Hanna, s
    9·1 answer
  • What are party whips in Congress? How did they influence legislation?
    6·1 answer
  • Please answer this question ​
    12·1 answer
  • What should be done to protect and promote child right ? Make a list of your suggestion and present in the class​
    5·1 answer
  • A direct democracy is a form of government in which citizens
    7·1 answer
  • Gloria, a misophoniac, (someone who has an extreme reaction to unpleasant sounds) can't stand the sound of the seat belt warning
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!