COMM 400 Final Exam Part One ( 8-12)
_______ refer to the tensions that result from the conflicting nature of how the public defines relationship and the private interactions that take place in the relationship. 1. Spatial dialectics 2 . Contextual dialectics 3. Dualistic dialectics 4. Interactional dialectics
2 . Contextual dialectics
Social Penetration theorists believe that it is the primary way that superficial relationships progress to intimate relationships 1. depenetration 2. Self-actualization 3. dissolution 4. self-disclosure
4. Self-disclosure
T or F? Social Exchange Theory says that a relationship in which the partners have no power over each other will be the most satisfying and least costly
False
In Social Exchange Theory, the dependence a person has on another for ourcomes is called _______
POWER
T or F? A basic assumption in Social Exchange Theory is that people are rational decision makers.
True
Which of the following statements is true of comparison levels (CL)? a . Individuals base their CL on past experiences with a specific type of relationship . b. Relationships portrayed in the media have little effect on our own relationships. c. CLs remain the same for all individuals. d. There is a typical standard on which to base comparison levels.
a . Individuals base their CL on past experiences with a specific type of relationship .
Which of these communication traditions is associated with Social Exchange Theory? a. socio - psychological communication tradition b. rhetorical communication tradition c. critical communication tradition d. semiotic communication tradition
a . socio - psychological communication tradition
_____ refers to the process by which one person's openness leads to the other's openness. a. Depenetration b. Reciprocity c. Dissolution d. Orientation
a. Depenetration
Which of the following statements accurately expresses the relationship between people and rules? a. People learn rules by negotiation with others to create new rules. b. The rules people set does not reflect their personal values. c. Rules and relationship satisfaction are not related. d. People have little respect for rules in close relationships.
a. People learn rules by negotiation with others to create new rules.
Uncertainty Reduction Theory posesor truisms drawn from past research and common sense, to explain the process of reducing uncertainty in initial interactions a. axioms b. personal space expectancies c. research questions d. disclosure violations
a. axioms
Nancy is close to her doctor, frequently sharing personal information with her. Thus, the bond formed between Nancy and her doctor represents the concept of Communication Privacy Management Theory. a. boundary linkage b. boundary coordination c. boundary bonding d. boundary rule
a. boundary linkage
Social penetration includes verbal, nonverbal, and _______ behaviors. a. environmentally oriented b. reciprocal c. affective d. well intentioned
a. environmentally oriented
According to Edward T. Hall (1977),_________are are defined as those cultures in which meaning is found in the explicit code or message. a. low-context cultures b. high-context cultures c. indirect cultures d. direct cultures
a. low-context cultures
2. The "stranger-on-the-train" phenomenon is an example of a. nonstrategic disclosure b. depenetration c. strategic disclosure d. affective exchange
a. nonstrategic disclosure
Between child, adolescent, adult, and elderly person's privacy boundaries, which privacy bounday is the largest?
adult
An exchange where two people reciprocate costs and rewards is called a(n) ________ a. generalized exchange b . direct exchange c. productive exchange d. economic exchange
b . direct exchange
Which of the following is NOT one of Baxter and Montgomery's dialectics? a. extroversion-introversion b . novelty - predictability c. autonomy-connection d. openness-protection
b . novelty - predictability
Kelsey meets Ethan on an online dating site and is considering meeting her in person. When she Googles Lisa to find out if what Lisa has disclosed about herself matches information on the online public record, she is reducing uncertainty by using a(n) ________. a. interactive strategy b extractive strategy c. active strategy d. passive strategy
b extractive strategy
______ refers to the way people use communication to make sense of the contradictions in their relationships a. Single agency b. Dialectical unity c. Time alternation d. Relational development
b. Dialectical unity
_______is a term developed by Rawlins (1992) to explain the fact that some relationships fulfill both public and private functions a. Relational functioning b. Double agency c. Duality d b. Cyclic alternation
b. Double agency
How did Petronio's earlier work on Communication Privacy Management differ from her later conceptualization of the theory? a. The boundaries of the theory are now confined to privacy management within a marital dyad. b. She now refers to the theory as a macrotheory because its boundaries include a large variety of interpersonal relationships c. She now calls it "Please Stand By" theory. d. The theory has now dropped the boundary metaphor to explain the management process
b. She now refers to the theory as a macrotheory because its boundaries include a large variety of interpersonal relationships
An individual's personality begins to emerge in the ________ of social penetration. a. orientation stage b. affective exchange stage c. exploratory affective exchange stage d. stable exchange stage
b. affective exploratory
All of the following statements about dialectical tensions are true EXCEPT a. people are not always able to resolve the contradictions that they experience and may become comfortable in believing inconsistent things about relationships b. dialectical theorists support the notion that there is typically one point of view that should dominate a relationship c. Baxter and Montgomery are the researchers most closely associated with the application of dialectical theory to relationships d. partners in a relationship experience ongoing tensions between contradictory impulses
b. dialectical theorists support the notion that there is typically one point of view that should dominate a relationship
Which communication context is the focus of Communication Privacy Management? a. intrapersonal communication context b. interpersonal communication context c. small group communication context d. public communication context
b. interpersonal communication context
All of the following are assumptions about uncertainty reduction identified by the authors EXCEPT a. uncertainty is an aversive state, generating cognitive stress b. people experience uncertainty in interpersonal settings c. when strangers meet, they want to reduce their uncertainty and increase their predictability d. it is unreasonable to attempt to predict people's behavior in a law-like fashion
b. people experience uncertainty in interpersonal settings
In the of interpersonal communication, self-disclosure increases as parties begin to reduce their uncertainty about one another. a. initial phase b. personal phase c. primary phase d. exit phase
b. personal phase
Uncertainty Reduction Theory has been investigated using primarily the approach to knowing a. critical b. positivistic c. interpretive d. axiological
b. positivistic
Three forms of integration as a strategy for managing tensions are a. reframing, disqualifying, selecting b. reframing, neutralizing, disqualifying c. neutralizing, segmenting, disqualifying d. segmenting, selecting, disqualifying
b. reframing, neutralizing, disqualifying
In their comparison of low and high-context cultures, Gudykunst and his colleagues discovered that a. the frequency of communication predicts uncertainty in high-context cultures, but not in low-context cultures b. the frequency of communication predicts uncertainty in low-context cultures, but not in high-context cultures c. the frequency of communication predicts uncertainty in both low-context and high-context cultures. c. the frequency of communication predicts certainty in both low-context and high-context cultures.
b. the frequency of communication predicts uncertainty in low-context cultures, but not in high-context cultures
As partners for over a decade, Jeff and Lily have clear rules about information that they keep to themselves and information they share with close friends. The couple is practicing the _________ concept of Communication Boundary Management Theory a. boundary explicitness b. boundary ownership c. boundary communication d. boundary permeability
boundary ownership
If Lawrence moves away from the neighborhood and friends and neighbors help pack up the moving van, this situation explain in terms of exchange structures. a. productive exchange b. economic exchange c . generalized exchange d. direct exchange
c . generalized exchange
Which of the following is NOT one of the features of boundaries as discussed in Privacy Management Theory? a. Boundaries can be personal. b. Boundaries can change across one's life span. c. Boundaries are normally set by those in power. d. Boundaries can be rigid.
c. Boundaries are normally set by those in power.
Which of the following assumptions of Social Penetration Theory is NOT correctly stated? a. Relational development includes depenetration and dissolution. b. Relational development is generally systematic and predictable. c. Relationships progress from intimate to nonintimate. d. Self-disclosure is at the core of relationship development.
c. Relationships progress from intimate to nonintimate.
_______ refers to revealing private information about oneself to another a. Explanation b. Self-actualization c. Self-disclosure d. Reactivity
c. Self-disclosure
Aaron and Allison have been roommates for two months. Although they feel quite close, they still find themselves in conflict sometimes. For instance, Aaron has accused Allison of revealing personal information about him. Allison, however, felt that Aaron didn't clearly say that the information should be kept private. This episode represents the concept of Communication Privacy Management Theory a. collective boundary b. thin boundaries c. boundary turbulence d. boundary permeability
c. boundary turbulence
Communication Privacy Management relies on the boundary metaphor to make the point that there is a line between being public and being private. When private information is shared, the boundary around it is called a _____ a. personal boundary b. private boundary c. collective boundary d. disclosure boundary
c. collective boundary
Relationships in which costs exceed rewards are perceived as having a. positive worth b. instability c. negative worth d. supportive outcomes
c. negative worth
The dialectic between________ refers to the conflict between the comfort of stability and the excitement of change. a. openness and protection b. autonomy and connection c. novelty and predictability d. speculation and contradiction
c. novelty and predictability
All of the following which means that statements about self-disclosure are true EXCEPT disclosures are spontaneous strangers in public places a. self-disclosure can be nonstrategic, which means that disclosures are spontaneous b. self-disclosure sometimes occurs with strangers in public places c. self-disclosure is not necessary to move nonintimate relationships toward intimacy d. self-disclosure can be strategic, which means that disclosures are planned
c. self-disclosure is not necessary to move nonintimate relationships toward intimacy
_______ are violations of relational rules, practices, and expectations. a. Reciprocities b. Depenetrations c. Transgressions d. Social exchanges
c. transgressions
11. According to Hofstede (1991) and Smith (2015), _______ refers to an attempt to shun ambiguous a. heurism b. Prediction c. uncertainty avoidance d. self-disclosure
c. uncertainty avoidance
In which of the following do uses of personal idioms occur? a. exploratory affective exchange stage b.orientation stage c.affective exchange stage d. stable exchange stage
c.affective exchange stage
Your ability to influence your relational partner's actions, such as when you convince her or him to spend time alone with you rather than go out with friends, is called a. fate control b. stability control c. relational control d . behavior control
d . behavior control
The _______ is used to illustrate the way in which two people believe that rewards should be exchanged between them in the relationship. a. given matrix b. chosen matrix c. effective matrix d . dispositional matrix
d . dispositional matrix
The Prisoner's Dilemma is a simulation game that was created to illustrate a. the value of conflict in relational exchanges b. the impact of time and change on relational life c. the importance of not revealing private information about oneself to others d . the fact that social exchange is a function of interdependence
d . the fact that social exchange is a function of interdependence
_______ deals with the ambiguity associated with beliefs and attitudes that we and others hold. a. Behavioral uncertainty b. Initial uncertainty c. Value uncertainty d. Cognitive uncertainty
d. Cognitive uncertainty
__________ refers to the choice-making capacity of humans. a. Totality b. Autonomy c. Spontaneity d. Praxis
d. Praxis
The authors point out that the choices we make in relationships are often influenced by all of the following EXCEPT a. previous choices b. choices of others c. cultural and social conditions d. cognitive dissonance
d. cognitive dissonance
10. According to Communication Privacy Management Theory, which of the following is NOT considered to be a decision criterion for privacy rule development? a. gendered criteria b. contextual criteria c. cultural criteria d . economic criteria
d. economic criteria
"If Meredith and LaTasha think their families are bothering their relationship too much, they can engage in conflict with them until they change their families' minds." As such the transformations you are able to make to your matrix is called ______ a. given matrix b. dispositional matrix c. chosen matrix d. effective matrix
d. effective matrix
Uncertainty Reduction Theory has been expanded into many concepts. This refers to the criterion known as a. utility b. parsimony c. Scope d. heurism
d. heurism
The principles of Communication Privacy Management Theory. These principles looked at ____ a. reasons for relationship termination b. friendship formation c. initial encounters with the opposite gender d. how people decided on the rules guiding their disclosure behavior
d. how people decided on the rules guiding their disclosure behavior
All of the following statements about the relationship between comparison level (CL), comparison level for alternatives (CLalt), and outcomes are true EXCEPT a. if the outcome is greater than the CL, which is greater than the CLalt, the relationship will be viewed as being satisfying and stable b. if the CL is greater than the CLalt, which is greater than the outcome, the relationship will be viewed as being unsatisfying and unstable c. if the CL is greater than the outcome, which is greater than the CLalt, the relationship will be viewed as being unsatisfying and stable d. if the outcome is greater than the CLalt, which is greater than the CL, the relationship will be viewed as being unsatisfying and stable
d. if the outcome is greater than the CLalt, which is greater than the CL, the relationship will be viewed as being unsatisfying and stable
4. One of the axioms of uncertainty reduction states that as nonverbal affiliative expressiveness _______ uncertainty levels a. decreases; increase b. increases; increase c. decreases; decrease d. increases; decrease
d. increases; decrease
________ refers to the processual nature of relationships and their change over time. a. Praxis b. Totality c. Speculation d. Motion
d. motion
Ethan has been dating Leah for less than a month. Ethan wants to become closer to Leah by sharing some very personal information, but he is also nervous about revealing too much, which could have negative relational consequences. Which dialectical tension is Ethan experiencing? a. novelty and predictability b. real and ideal c. autonomy and connection d. openness and protection
d. openness and protection
1. When access to private information is closed, boundaries are said to be _______. When access is open, people have _______ in place. a. limited boundaries; expansive boundaries b. expansive boundaries; limited boundaries c. thin boundaries; thick boundaries d. thick boundaries; thin boundaries
d. thick boundaries; thin boundaries
In the context of Social Penetration Theory _______ refers to a pathway to closeness. a. intimacy b. affective exchange c.social exchange d. trajectory
d. trajectory
T of F? Dyadic uniqueness emerges in the affective exchange stage of the social penetration process.
false
Sabatelli and Shehan use the metaphor of a(n) _____ to describe the social exchange that takes place in relationships a. marketplace b. Onion c. grandfather clock d. bank
marketplace
Petronio has argued that privacy can only be understood in dialectical tension with disclosure. If we disclose everything, we won't have a concept of privacy.
true
T or F? High levels of uncertainty produce high rates of reciprocity.
true
T or F? Increases in uncertainty level produce decreases in liking.
true
T or F? A contextual dialectic resulting from the difference between idealized relationships and-lived relationships is known as the real and ideal dialectic.
true
When private information is shared, the boundary around it is called a collective boundary
true