According to your textbook, "So, how can we protect our Internet data from potential hackers?" is an example of a(n)
A. transition.
B. signpost.
C. internal preview.
D. rhetorical question.
E. bridge.
Answer: B
You might also like to view...
Analysis measurement of things such as message prominence and tone can be subject to which one of the following difficulties?
a. observer bias b. sample size c. media reporting d. message complexity
An attempt to reduce responsibility for a crisis by appealing to factors that can’t be controlled is an example of which of the following image restoration strategies?
a) attack the accuser b) appeal to accidents c) differentiation d) shifting the blame
Group silence always requires intervention by a leader
Indicate whether the statement is true or false.
Wanda, who is engaged, was excited about her informative speech for her freshman-level public speaking class because she liked her topic: planning a wedding. However, during the speech, the class seemed distracted and disinterested. Given this information about the situation, what was most likely Wanda's mistake?
A) She didn't have enough research and statistics in the speech to make it interesting. B) She was speaker-centered rather than audience-centered in her topic selection. C) She confused the roles of speaker and listener. D) She violated several ethical principles of public speaking.