cold read

cold read
1. verb
a) To deduce using the practice of cold reading.

He told us he was able to cold read the mans profession

b) To perform a script without preparation.

"..., we meet someone and want to find out a little more about him/her ..., so, completely without conscious thought, we begin to cold read. [

an act of cold reading.

This is an example of what magicians (and unfortunately phony psychics) call a "cold read". [


Wikipedia foundation.

Игры ⚽ Нужна курсовая?

Look at other dictionaries:

  • Cold Case (TV series) — Cold Case Promotional poster Format Police procedural Drama Created by Meredith Stiehm …   Wikipedia

  • Cold World (Steve "Silk" Hurley and Jamie Principle song) — Cold World Single by Steve Silk Hurley featuring Jamie Principle from the album Work It Out Compilation …   Wikipedia

  • Cold Case (season 7) — Cold Case Season 7 Country of origin United States No. of episodes 22 Broadcast Original channel CBS …   Wikipedia

  • Cold Reading (The Twilight Zone) — Cold Reading The Twilight Zone (1985 series) episode Scene from Cold Reading Episode no. Season 1 Episode 18c …   Wikipedia

  • Cold reading (theatrical) — Cold reading is a term used by actors and other performers in theatre, television, film, and performance fields. A cold reading is a reading aloud from a script or other text without any rehearsal, practice or study in advance. It is also… …   Wikipedia

  • Cold Wars — Heroes episode Matt uses his Telepathy to press Noah for information …   Wikipedia

  • Cold on the Shoulder (Gordon Lightfoot album) — Cold on the Shoulder Studio album by Gordon Lightfoot Released February, 1975 Recorded …   Wikipedia

  • Cold Case (season 3) — Cold Case Season 3 Country of origin United States No. of episodes 23 Broadcast Original channel CBS …   Wikipedia

  • Cold Stones — The Sopranos episode Episode no. Season 6 Episode 76 …   Wikipedia

  • Cold boot attack — In cryptography, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access to a computer is able to retrieve encryption keys from a running operating system… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”