You have prepared the following thesis for a speech: "Privacy on the internet should be protected by a ban on identity theft because everyone has the right to have control over his or her personal information." List 3 audience analysis questions that your audience will expect to hear the answers to in your speech.
Fill in the blank(s) with the appropriate word(s).
Answer will vary
You might also like to view...
This type of violence tends to be reciprocal and occurs in the midst of conflict.
A. intimate terrorism B. negativity spirals C. common couple violence D. friendly fire
Subtext, especially important to method acting, involves what's beneath the language of the script: not what people say, but what they really want
Indicate whether this statement is true or false.
Which one of the following would be an ineffective strategy to use during the interview?
A. Conduct the interview using the tone of an investigative reporter. B. Show interest in the person's answers to your questions. C. Point out when the scheduled ending time has been reached. D. Be prepared to deviate from the interview guide that you developed.
_________ is the relational process of creating and interpreting messages that elicit a response.
A) message exchange B) Communication C) Symbolic interactionism D) Theory building