03.09.2016 Views

COM 537 Final Exam

If you are interested for COM 537 final exam, COM 537 Final Exam Answers, UOP COM 537 Final Exam Question And Answers, COM 537 Final Exam Answers Free, Final exam answer key right here in USA via UOP E Assignments : http://www.uopeassignments.com/University-of-phoenix/COM-537-Final-Exam-Latest.html

If you are interested for COM 537 final exam, COM 537 Final Exam Answers, UOP COM 537 Final Exam Question And Answers, COM 537 Final Exam Answers Free, Final exam answer key right here in USA via UOP E Assignments : http://www.uopeassignments.com/University-of-phoenix/COM-537-Final-Exam-Latest.html

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

06.Your supervisor has the habit of coming into your office and leaning<br />

over your desk to talk to you. This situation is uncomfortable for you<br />

because you cannot move away from him. According to Edmund Hall, this<br />

behavior exhibits the theory of<br />

high-context cultures<br />

low-context cultures<br />

ethnocentricism<br />

proxemics<br />

07.Which statement is true concerning the role of publics in business<br />

communication?<br />

Publics, in general, remain constant despite changes in the<br />

environment.<br />

Internal publics are usually not concerned with the communication<br />

style used by management.<br />

External publics are not concerned with an organization’s public<br />

performance.<br />

Publics can dispel rumors and build positive brand image.<br />

08.A break-in at your company has resulted in the theft of various<br />

pharmaceutical products. The head chemist, slated as the company’s<br />

designated spokesperson, is scheduled to appear at a media conference.<br />

This course of action illustrates one of the steps in crisis communication<br />

planning. Select the appropriate step:<br />

Assessing the possible risk to the organization<br />

Evaluating the effectiveness of your action plan<br />

Identifying levels of vulnerability in your company<br />

Implementing the action plan

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!