1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DaniilM [7]
3 years ago
14

According to your textbook, emotional appeal isa.inappropriate in a persuasive speech on a question of policy.b.often necessary

when a speaker is trying to move an audience to action.c.most effectively generated by using emotionally charged words.d.unethical unless the emotional appeal is combined with causal reasoning.e.seldom used by public speakers in support of honorable causes
Social Studies
1 answer:
professor190 [17]3 years ago
4 0

Answer:

B.

Explanation:

An emotional appeal is a type of persuasive language used to move people to action. It is also known as pathos. The orator uses emotional appeal to bring emotional action from his audience.

As your textbook explains, emotional appeal is important to use when the speaker wants his audience to take action. Using emotional appeal in persuasive speech to move the audience to action is a wise strategy.

Therefore, option B is correct.

You might be interested in
How did the book "the jungle" impact America
timurjin [86]

Answer:

it exposed the appalling working conditions in the meat-packing industry and described it as diesiesed and contaminated which shocked the buisness

Explanation:

7 0
3 years ago
Who are experts in technology who use their knowledge to break into computers and computer networks, either for profit or just m
jonny [76]

Answer:

Those experts are called <u>White Hat Hackers</u>

Explanation:

<em>White hat hackers </em>are those whose hacking activities are for a noble cause. They are also known as <em>ethical hackers</em>. Their primary motivation is usually not for personal or financial gain.

Also, they cannot be involved in cyber espionage, system hacking without the permission of the system owner.

They could be <em>paid employees or contractors working for companies as security specialists that attempt to find security holes via hacking.</em>

6 0
3 years ago
Individuals who focus on themselves as social objects, as seen by others, are said to be high in ____.
Anna71 [15]

Answer:

caring about themselves

3 0
3 years ago
Hannah spent months working hard in planning her perfect wedding. The wedding went off without a hitch, but Hannah reported that
Margaret [11]

Answer: Hannah felt this way because her body couldn't differentiate between good stress and bad stress. Hannah had a wonderful wedding, but ended up tired due to the stress-response

8 0
3 years ago
Provide two examples of state branches using checks and balances
Dennis_Churaev [7]

Answer: There is the judicial and the legislative

Explanation:

8 0
3 years ago
Other questions:
  • A "second-generation american" can best be described as someone:
    6·2 answers
  • Building a house uses natural resources, human resources, and capital goods. In 1–3 sentences, give an example of each productiv
    5·1 answer
  • Who sailed the ocean blue in 1492???
    12·1 answer
  • An immigrant is someone that is __________.
    7·2 answers
  • the berlin conference (1884-1885) 14 European nations met in Berlin to lay down the rules and avoid fighting between the nations
    8·1 answer
  • What do we know about love?
    6·1 answer
  • The primary concern about children with attention-deficit/hyperactivity disorder (ADHD) is that Group of answer choices ADHD int
    7·1 answer
  • The caste system divides the members of India's society into
    8·1 answer
  • According to Merton (Theory of Structural Strain), anomie represents a misalignment of __________ for individuals in the lower c
    8·1 answer
  • Patient is diagnosed with right bundle branch block. what icd-10-cm code is reported?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!