1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
STatiana [176]
3 years ago
14

In the elaboration likelihood model of persuasion, the central route Select one: a. is effective when people lack the time or en

ergy to think about the message. b. is more persuasive when people have the ability and the motivation to pay attention. c. involves factors such as the source's attractiveness or the emotional power of an appeal. d. is usually used by television advertisers to persuade the viewers into buying their products.
Social Studies
1 answer:
SashulF [63]3 years ago
6 0

In the persuasion elaboration likelihood model, the central route is more persuasive when people have the ability and the motivation to pay attention. Persuasion is formed through two routes:

  • Central
  • Peripheral

The peripheral route is used when people's motivation is low and there is no ability to process the message. The central route is used when there is high motivation and message processing capacity.

Therefore, the attitudes formed in the central route are more consistent, and resistant to contrary arguments, and more likely to determine people's behaviors and attitudes, generating changes in attitudes and durability.

Learn more here:

brainly.com/question/7147946

You might be interested in
A researcher shows a baby a toy. Together they bury the toy in some sand in one location in the sandbox. Than the researcher rea
ohaa [14]

Answer:This type of paradigm is called violation of expectations .

Explanation:

What does violation of expectations mean?

Violation expectation is a method which is used to teach and test if children understand that a solid object can not shift from one place to a place that is already occupied by another solid object.

If children show signs of being surprised by the fact that an object moved and occupied a space that was previously occupied that means they have an understanding.

8 0
3 years ago
Jamal works in a factory in Lake Zurich, Illinois, assembling toy trains. The factory owner updates the current equipment and in
Tom [10]

Answer:

e. structurally unemployed.                                                            

Explanation:

Structural unemployment: It refers to a mismatch or discrepancy between the skills of the unemployed person and the jobs available. Structural unemployment occurs when finding a job becomes difficult for people due to the shift in the economy. In this scenario, the process of outsourcing becomes possible.

Causes:

1. Occupational immobilities.

2. Geographical immobilities.

3. Labour market flexibility.

Jamal would be considered as structurally unemployed.

8 0
3 years ago
What are the main causes of world war 1 ?
lisabon 2012 [21]
1.) nationalism: It is a deep loyalty to one's nation
2.) alliance system: It is the formal agreement of support among countries in the event of an attack
3.)imperialism: The building of power by controlling over colonies. (Countries were arguing over colonies and this caused war).
4.)militarism: It is the preparation of the war.
Hope it helps :)
3 0
4 years ago
Read 2 more answers
Why was the Roman empire difficult to govern
larisa86 [58]
Attacks from barbarian tribes outside of the empire such as the Visigoths, Huns, Franks, and Vandals. The Roman army was no longer a dominant force. The empire became so large it was difficult to govern.
7 0
3 years ago
__________ occurs when one person or program successfully masquerades as another by falsifying data and gains an illegitimate ad
jolli1 [7]

Answer:

The answer is a spoofing attack.

Explanation:

The different protocols related to the TCP/IP suite do not provide the correct ways or mechanisms to authenticate the message's source or destination. Thus, these protocols are vulnerable to spoofing attacks because the applications must take more precautions to know the identity regarding the sending or receiving host.

When there are spoofing attacks in the protocols referring to the TCP/IP suite, there is necessary to use firewalls to solve the problem. We can also see spoofing attacks in e-mails. Spammers use this technique to hide the origin of the respective e-mails and provoke issues like misdirected bounces.  

3 0
3 years ago
Other questions:
  • To great britain, the signing of the declaration of independence was and act of?
    13·2 answers
  • Mr. Letourneau is flying his broom stick parallel to the ground. He undergoes two consecutive displacements. The first is 100 km
    7·1 answer
  • In the Chinese creation myth, which of the following does Pan Gu do?
    15·1 answer
  • 2. How does Scout make sense of an earlier remark of Atticus's in regards to standing in someone’s shoes as she stands on the Ra
    8·1 answer
  • What kind of art did they have in ancient india?
    6·1 answer
  • about how many months did it take Sarah Raymond in her family to get from Missouri to Virginia City in the Montana territory in
    12·2 answers
  • Which business organization has the MOST liability on the owner
    7·1 answer
  • The units manned by Special Warfare Combat-craft Crewmen who operate and maintain a variety of combatant and other craft for mar
    6·1 answer
  • Can someone please help me with this pls
    10·1 answer
  • The reaction that occurs when information interacts with the eyes, ears, tongue, nostrils, or skin is referred to as: Multiple c
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!