Communication Privacy Management relies on the boundary metaphor to make the point that there is a line between being public and being private. When private information is shared, the boundary around it is called a
A. disclosure boundary
B. personal boundary
C. private boundary
D. collective boundary
Answer: D
You might also like to view...
Well-prepared visual aids indicate that the speaker has a carefully planned presentation and has taken
the audience seriously, therefore enhancing the A) speaker's ethos, the audience's interest, and retention. B) speaker's ethos, pathos, and logos. C) speaker's credibility, presentation, and delivery. D) speaker's strategic planning, organization, and arguments. E) audience's interest, retention, and sight lines.
Attending an event, writing a quick story of what happened and why it mattered, then moving on to the next event is an example of ______.
A. hit-and-run journalism B. a smear piece C. a day two story D. a personality profile
Process speeches or speeches which feature steps that follow one another in a logical sequence use which pattern?
A) ?spatial B) ?chronological C) ?topical D) ?causal E) ?pro-con
In 2006, the advertising industry revised its guidelines for advertising to children. These included ______.
A. distinguishing between advertising and programming B. identifying when online games contained advertising C. showing the advertised food as part of a complete meal D. all of these