Download doc - MB0039 Set 1

Transcript
Page 1: MB0039 Set 1

MB0039 Set1

Name:

Roll No:

Learning Centre:

Subject: MB0039 Business Communication

Assignment No: Set 1

Date of Submission at the Learning Centre:

1 | P a g e

Page 2: MB0039 Set 1

MB0039 Set1

Q 1. Describe any situation that you experienced where the communication went wrong because the listening was faulty. Analyze the situation by explaining the type of listening barrier. . How could this barrier be overcome?

Answer:

As pointed out earlier, listening is not easy and there are a number of obstacles that stand in the way of effective listening, both within and outside the work place. These barriers may be categorized as follows-

1. Physiological Barriers - This was discussed earlier under the barriers to communication. Some people may have genuine hearing problems or deficiencies that prevent them from listening properly. Once detected, they can generally be treated. Other people may have difficulty in processing information, or memory related problems which make them poor listeners. Another physiological barrier is rapid thought. Listeners have the ability to process information at the rate of approximately 500 words per minute, whereas speakers talk at around 125 words per minute. Since listeners are left with a lot of spare time, their attention may not be focused on what the speaker is saying, but may wonder elsewhere.

2. Physical Barriers - This refers to distraction in the environment such as the sound of an air conditioner, cigarette smoke, or an overheated room, which interfere with the listening process. They could also be in the form of information overload. For example, if you are in a meeting with your manager and the phone rings and your Mobil beeps at the same time to let you know that you have a message, it is very hard to listen carefully to what is being said.

3. Attitudinal Barriers - Pre-occupation with personal or work related problems can make it difficult to focus ones attention completely on what a speaker is saying, even if what is being said is of prime importance. Another common attitudinal barrier is egocentrism, or the belief that you are more knowledgeable then the speaker and that you have nothing new to learn from his ideas. People with his kind of closed minded attitude make very poor listeners.

4. Wrong Assumption - The success of communication depends on both the sender and the receiver, as we have seen in an earlier unit. It is wrong to assume that communication is the sole responsibility of the sender or the speaker and that listener have no role to play. Such an assumption can be a big barrier to listening. For example, a brilliant speech or presentation, however well delivered, is wasted if the receiver is not listening at the other end. Listeners have as much responsibility as speakers to make the communication successful, by paying attention, seeking clarification and giving feedback. Another wrong assumption is to think that listening is a passive activity, in which a listener merely absorbs the toughs of the speaker.

On the contrail, real listing is heard work – it requires speaking sometimes to ask questions, agree or disagree with the speaker, give feedback, etc. Yet another barrier of this type is to assume that speakers are more powerful then listeners. Speakers are seen as being in command of things, whereas listeners are seen to be weak and lacking authority. According to

2 | P a g e

Page 3: MB0039 Set 1

MB0039 Set1

communication experts however, the reserve is true. Listeners are as important and as powerful as speakers. In fact David J. Schwartz, writer and management professor, emphasizes the importance of listening by saying “Big people monopolize the listening. Small people monopolize the talking.”

5. Cultural Barriers - Accents can be barriers to listening. Since they interface with the ability to understand the meaning of words are pronounced differently. The problem of different accents arises not only between cultures, but also with in a culture. For example, in a country like India where there is enormous cultural diversity, accent may different even between different regions and states. Another type of culture barrier is differing cultural values. The importance attached to listening and speaking differs in western and oriental cultures. Generally, Orientals regard listening and silence as almost a virtue, whereas westerners attach greater importance to speaking. Therefore this world interfaces with the listening process when two people from these two different cultures communicate.

6. Gender Barriers - Communication research has shown that gender can be a barrier to listening. Studies revealed that men and women listen very differently and for different purposes. Women are more likely to listen for the emotions behind speaker’s words, while men listen more for the fact and the content.

7. Bad Listening Habits - Most people are very average listeners who have developed poor listening. For example, some have the habit of “faking” attention, or trying to look like a listener, in order to impress the speakers and to assure him that they are paying attention. Others may tend to listen to each and every fact and, as result, miss out on the main point. Yet another habit is to avoid difficult listening and to tune off deliberately, if the subject too technical or difficult to understand. Sometimes, the subject itself may be dismissed as uninteresting, because the listener does not want to listen.

HOW TO OVERCOME THIS TYPE OF BARRIERS:-Although a number of barriers stand in the way of effective listening, these can be overcome through conscious efforts, training and practice. Some of the suggested methods are discussed in detail below-

1) Create a conductive environment - To an extent, you con tray to control the environment in which commutation takes place, so that listening can take place without any distractions. Ensuring a proper sound system acoustics so that the speakers is audible, avoiding place with high levels of activity, loud noises from the outside environment and poor air conditioning system, shutting off mobile phone and telephones, are some of the way in which you can overcome some of the physical barriers to listening.

2) Select Face-to-face Channels - Listening is less accurate in the in the absence of face-to-face communication. For example, listening to and understanding an idea currently over the telephone is much herder then through face-to-face meeting. Take the case of calling a restaurant and placing orders over the telephone for home delivery of a meal. The chances are that your order

3 | P a g e

Page 4: MB0039 Set 1

MB0039 Set1

may not be understood currently. Therefore, as far as possible, arrange face-to-face contact ensure more accurate listening.

3) Be Open Minded And Avoid distractions - Listening is an exhausting activity which requires the right attitude and mindset. You have to focus your attention completely on what the speaker is saying, without letting your mind wander. This kind of concentration can be developed through various techniques and through constant practice.

4) Use Non-verbal Cues to Indicate Active Listening – It is important to communicate to the speaker that you are listening actively to what he is saying. This can be done even without verbal communication. All the different aspects of non-verbal communication discussed earlier should be used for maximum effect.

5) Use Verbal communication to Indicate Active Listening – While non-verbal behavior by itself can communicate that you are an active listener, it is also important to engage in verbal communication with the speaker. Silence is often interpreted as lack of understanding or attention. You need to seek clarification, give feedback and suggestion, or just paraphrase in your own words what the speaker has said, in order to convey that you have understood his message.

6) Listening First Before Responding- Always let yourself finish listening before you being to speak. Avoid the tendency to formulate your own response, even before you have listened completely to the speaker’s words. If you are too busy thinking about what to say next, you may miss the main point that the speaker is trying to make. This also gives the speaker the impression that you are pre-occupied or rude.

7) Use the Speaker-listener Gap constructively- It was pointed out earlier that listeners have the ability to absorb information faster than speaker’s rate of speech. This spare time available to listeners is often misused by letting the mind wander and is one of the physiological barriers of listening. One way of overcoming this barrier is to try to use this spare time to note down what the speaker has said, review what has been said so far and anticipate what he may say next. Thinking ahead of the speaker and trying to guess where his talk is leading, is a good strategy for effective listening. This is not easy, but can be learnt through proper training.

8) Ask Questions of Yourself and Make Notes- In order to engage in active listening, you also need to ask certain questions to yourself while listening. For example, “What is the key idea that speaker is trying to convey?”, “How does this fit in with I already know on the subject?”, or “How is this presentation organized?” are some possible question that you could jot down along with this answers.

4 | P a g e

Page 5: MB0039 Set 1

MB0039 Set1

Q 2. Select a business article from any business publication. Evaluate it in terms of:

Answer: a) Appropriate level of readability b) Use of jargon, slang and metaphors c) Use of simple vs. complex words. Is it well or poorly written, in your opinion? Attach a copy of the article with your response.

Answer:

Business Article:-Insurance Fraud Hall of Shame: Greatest Insurance Fraud Claims-Claiming false compensation from the insurer is one of the common financial crimes.Below are given some of the greatest fraud claims in the US Insurance history.World Trade Centre Fraud: Charles and Cynthia Gavett transformed the US’s worst tragedy in a scam by stealing USD 628000 from the life-insurers. Charles told the seven Life Insurers that his wife Cynthia Gavett had died in the September 11, 2001 World Trade Centre Attack and collected about USD 273000 from the insurers. However, they could not get away for long and both husband and wife were arrested and got 10 years imprisonment in May, 2002.

Turquitt Drug Scam: Another innovative insurance scam had taken place in US which included giving drugs to addicts so that they die early and then taking huge insurance claims on their names. Jimme and Isom Turquitt lured alcoholics and drug addicts off the streets of Birmingham, Los Angeles by promising them jobs and rooms at their brother’s rural property. The Turquitts took out more than 100 life insurance policies worth USD 8.6 million on the addicts. The brothers gave free drugs and drugs to the addicts so they would die faster and actually collected more than USD 1.6 million before the scam was broken up. Isom made suicide in prison whereas Jimmie received life without parole in federal prison in March, 2002.

Auto Insurance Scam in Police Station: Belinda Lovander was an employee with the New York Police Department. Using a computer, he wrote 22 fake police reports of car crashes that were staged by car ring or did not take place at all. The ring collected USD 9, 00,000 in insurance claims for bogus injuries. At least 115 people were ruined for the massive fraud – the largest bust of its kind in New York State History. Lovander was arrested later and was sentenced to 6 years prison in March, 2002.

Staging Faked Auto Accidents: Quentin “Flint” Hawkins stole USD 10 million from the insurers over a 20-year fraud rampage by staging fake auto accidents. Hawkins paid USD 500 or more to drivers and passengers in cars they maneuvered into low speed accidents. “Insured” passengers submitted bogus injury claims to insurers for up to USD 50000 each. Hawkins even recruited police officers, sons, bowling alley buddies and others to participate. Interestingly, even one woman sent Hawkins a resume for work as a fake accident victim; and more interestingly she got the job. Hawkins received 5 years in federal prison in September, 2002.

5 | P a g e

Page 6: MB0039 Set 1

MB0039 Set1

a) Appropriate level of readability: - A third very important rule of business writing to your audience and to make it simple enough for even a layperson to read and understand.As pointed out in an earlier section, readability is determined by the length of words and sentences. Robert Gunning developed what is known as the “Fog Index” or a readability formula to measure the readability of a piece of writing. According to this formula, the appropriate reading level in business writing should be between 8 and 11.

Calculation of the Fog Index involves the following steps –

1. Select a written passage of approximately 100 words.

2. Calculate the average length of a sentence dividing the total number of words in the passage by the number of sentence.

3. Find the number of difficult words. A word may be defined as difficult if it contains three or more syllables. Determine the number of difficult words per hundred, by dividing the total number of words in the passage into the number of difficult words, then by multiplying this figure by 100.

4. Add the number of difficult words per hundred and the average sentence length.

5. Multiplying the figure obtained in step 4 by 0.4, to calculate the reading grade level for which the passage was written, or the Fog Index. Ideally, the Fog Index should be between 8 and 11 for most business writing, indicating that a reader between the eight grades and the eleventh grade should be able to understand it without difficulty.

b) Jargon, Slang and Metaphors: - Jargon refers to technical terms that belong to a particular subject area or discipline. For example, medical jargon would include terms that only medical practitioners and not the lay person might understand. Such terms are to be avoided in general writing, since they would be out of context. The only instance where jargon can be used and might be essential is in reports of a highly technical nature, where the reader is in a position to understand these terms. Slang refers to casual words that are not accepted and recognized in a Standard English dictionary. While they could be used in a limited way in general or informal writing, they are to be avoided in business writing, which needs to be formal in nature.A metaphor is a figure of speech and refers to colorful comparisons which evoke visual images.

c) Common Errors in English: - “Indian English” tends to be prone to some common mistakes which should be avoided, in order to make the communication clear and easily understood by the receiver. Some of these mistakes include “Redundancies”. “Clichés” and “Frequently misused words”.

Redundancies – These refers to phrases which contain repetitive or unnecessary words to express the same meaning. This is a common Indian tendency and must be avoided.

6 | P a g e

Page 7: MB0039 Set 1

MB0039 Set1

Clichés – These are phases that are overused and should be avoided, since they make reading monotonous. They should be substituted with more original Expressions.Frequently Misused Words – Certain words which sound similar or are spelt slightly different, tend to be used in the wrong context.

Q 3 List out and briefly explain five “do”s and “don’t’s” for each of participants and chairperson of a meeting.

Answer:

Before the Meeting

As pointed out earlier, meetings need to be planned in advance, so that they are successful. Before any planning can be done however, a basic question to be asked is whether to hold a meeting at all. The answers to the following questions would help to decide whether a meeting is necessary in the first place –-Can the matter be decided or discussed over the telephone?-Can the matter be expressed in writing, in the form of a memo, or an email message?-Are key people available to attend the meeting and are they prepared?-Is the time allotted for the meeting sufficient?

If the answers to the first two questions are yes and the answers to the other two questions are no, there is no purpose in calling a meeting.

Once the need for a meeting has been determined, the next step is to start planning the meeting. First of all, the type and number of participants should be decided. A problem solving meeting should include representatives from all departments, since the decision would otherwise be incomplete. Shareholders, who are the owners of the company, should also be included. In terms of numbers, the size of the group could be anywhere between seven and eleven members. An exception to this is an information sharing meeting, where the numbers could be larger, so that a maximum number of people benefit from the information.

The second and most important step in planning a meeting is to indicate the purpose or agenda of the meeting to the participants in advance. An agenda is essentially a list of topics that will be discussed during a meeting. In the words of Adler and Elmhorst, “A meeting without an agenda is like a ship at sea without a destination or compass: no one aboard knows where it is or where it is headed.” An agenda is prepared by the Chairperson of the meeting, or the person who calls the meeting.

During the Meeting:

The task of conducting and moderating the meeting rests with the chairperson. He or she must be well versed with the procedures for opening the meeting, encouraging balanced participation,

7 | P a g e

Page 8: MB0039 Set 1

MB0039 Set1

and solving problems creatively, concluding the meeting and managing time efficiently. We shall discuss each of these procedures in detail.

1. Opening the Meeting – The manner in which the meeting is opened is important, since a good opening will ensure that the rest of the meeting will proceed smoothly. There are different ways of opening a meeting. Generally, it is best to sum up what has been stated in the agenda – including the goals, background information and expectations of the participants. It is also a good idea to provide an outline of how the meeting will proceed, as well as a time budget.

2. Encouraging Balanced Participation – It is also the responsibility of the chairperson to encourage silent members to contribute to the meeting and to moderate the dominant members, so that they do not “hijack” the meeting. There are several techniques to encourage participation –

• Encourage Participation in the Reverse Order of Seniority – This means getting the junior members to speak or air their opinions first. If the senior people speak first, they may feel suppressed or be afraid to disagree with their superiors.

• Nominal Group Technique – In this method, the meeting participants are encouraged to work and contribute their ideas independently

3. Managing Time – There is no prescribed length for a meeting. The duration of a meeting will depend on the type and purpose of the meeting. Generally, problem-solving meetings will take longer than other routine meetings. In any case, the chairperson should set a time budget for the meeting, depending on the agenda and ensure adherence to the time limit.

4. Keeping the Meeting Focused – Often, a lot of time is wasted during meetings by going off track and by discussing topics that are irrelevant. In such situations, it is the responsibility of the chairperson, or the person moderating the discussion to make sure that the discussion remains focused on the topics mentioned in the agenda.

5. Ensuring “Convergence” – Convergence means hearing the points of view of all the members and then arriving at a decision. It is again the responsibility of the chairperson to bring the meeting to a point where an opinion emerges on each item of the agenda.

6. Summing Up – This means summing up the different points of view, the decisions and the actions to be taken. This should be done by the chairperson, identifying the role of each person on each item of the agenda, along with a specified deadline.

Example – Chris will take the responsibility of contacting the media and sending material for advertisements and press releases by March 13th.

8 | P a g e

Page 9: MB0039 Set 1

MB0039 Set1

7. Concluding the Meeting – The way a meeting is concluded is as important as the opening, since it will influence the follow-up action taken on decisions made during the meeting. The chairperson should know when and how to conclude the meeting.

The meeting should normally be concluded at the scheduled closing time, unless important issues still remain to be discussed and members are willing to extend the meeting. Sometimes meetings may be concluded before the closing time, when key decision makers are not present, or when important information such as cost figures are not available.

8. Keeping “Minutes” of the Meeting – Since meetings are called to take important decisions concerning the organization, it is important to maintain a permanent written record of the proceedings, which can be referred to at a later stage, or serve as a guide for action. Such a record is known as “minutes” of the meeting and may be done in an informal or formal manner, depending on the type of meeting.

After the Meeting:

A meeting that proceeds smoothly will still not be successful, unless proper follow-up measures are taken to ensure that the goals are fully accomplished. Follow-up may involve the following steps –

1. Plan for the Next meeting – Very few meetings is conclusive and cover all the items in the agenda completely. It is the chairperson’s responsibility to make a note of the items that have not been discussed and to schedule the next meeting, along with a fresh agenda. All participants must be informed that a follow-up meeting is being planned.

2. Check Progress on Follow-up Actions – Members of the meeting may have been assigned different responsibilities and deadlines for completion of tasks. Therefore, it is important to monitor their progress every now and then, after the meeting is over, to ensure that the deadlines are met.

3. Do your own Groundwork – Apart from monitoring the progress of meeting participants, it is also important that you as the chairperson finish any pending work before the next meeting.

9 | P a g e

Page 10: MB0039 Set 1

MB0039 Set1

Q 4. Evaluate email as a channel of internal communication, explaining its advantages and disadvantages. Suggest five ways in which to overcome some of the problems associated with email messages.

Answer:

E-mail is one of the most effective ways of internal communication. Since e-mail is more informal in nature, we shall discuss these in some details-

Watch the contentE-mail message are not always confidential and one can never be sure who will read them. The minute an e-mail message is sent, multiple copies are created on your own PC and server. There is no way of ensuring that the message will not be forwarded to others. Sometimes E-mail message can even be used as proof in court. Once a message is sent, a permanent record is created, Therefore, it always wise to avoid writing anything negative or offensive. It is particularly important to watch the content of official E-mail message send using an employer’s equipment. Since the employer has a write to read the message and is legally responsible for its content. It must be carefully worded.

Pay attention to the toneThe very nature of E-mail communication can make the message sound negative, abrupt and rude. For one thing, E-mail lacks the personal quality of face-to-face communication, where body language and other nonverbal cues may be used to make the communication more positive. Secondly, E-mail message have to be brief, using short words, sentences and lack of solutions. Brief message may be interrupted as being rude and unfriendly. Therefore, you must pay close attention to the tone of the message and ensure that you should friendly and courteous. Avoid using humor and sarcasm which might be misunderstood, or sending message when you are angry or annoyed.

Include a specific subject lineYour E-mail message should always include a subject line that clearly mentions the topic of the E-mail. Since business executives received several E-mails a day, this would help them to decide which messages are most important to them. They will also have an idea of what the message contains.

Place important information firstSince business executives do not have time to read lengthy E-mail message, it is a good idea to put all the important information that you want to convey in the first three lines of the message. Whether you are seeking a clarification, making a request, or giving instruction, it is best to mention this right at the outset, so that it is noticed.

Explain attachment in the body of the E-mail

10 | P a g e

Page 11: MB0039 Set 1

MB0039 Set1

Attachment takes time to download and should be sent along with an explanation in the body of the E-mail, as to what they are all about. This will make it easier for the recipient of the message to decide whether they should be opened or not. Otherwise it will lead unnecessary waste of time.

Use the “to” and “cc” button carefully – The “to” box should be used only to send message to people who are responsible for doing something. The “cc” button is used when sending multiple copies of the same E-mail message to other recipients, who need to be kept informed on a specific issue. This should be used with care, making sure that the message is sent only to the right persons. It is important to respect privacy, science not everyone likes having their E-mail address displayed to other. Beside, sending a long list of E-mail addresses can interfere with the reading of the main message.

Pay attention to brevity, emphasis and white space – The look, appearance and language used in the E-mail message can influence the readability of the message. Some techniques for enhancing readability of E-mail message include short paragraphs, spacing between paragraph captions, highlighting main points in bold type and use of white space.

Use the “WIFM” rule – WIFM stands for “What's In For Me?” and means that the benefits of your message to the reader should be emphasized. This involves use of the second person pronoun, “you”, rather than the first person pronouns “I” or “me”. Stressing on the “you” attitude rather than the “me” attitude was discussed in an earlier unit.

Tidy up your mail box – E-mail traffic can lead to your inbox becoming cluttered, with more message than you can handle. It then becomes difficult to retrieve important message when you need them. It is therefore a good idea to clean up your mailbox regularly, by deleting unimportant message. The important message that you that you want to refer to later should be put into separate topic folders. Every now and then, any outdated messages in the topic folder should also be deleted.

Proofread your E-mail message – just as it is important to proofread business reports, letters and memos, E-mail message should also be checked for spelling and grammar mistakes, so as to avoid any embarrassment.

Set aside time to check E-mail – E-mail should not become a substitute for face-to-face interaction at the workplace, or cut into valuable time spent on other important jobs. It is good idea to determine a time during the work day when you check respond to E-mail message.

Advantages and Disadvantages of E-mail:

ADVANTAGES:

11 | P a g e

Page 12: MB0039 Set 1

MB0039 Set1

In his Technology, Open learning and Distance Education, Tony Bates (1995, p. 207) has summarized instructional benefits of computer-mediated communications (including email) as follows, and I personally concur:

· Developing academic discourse· Collaborative and project work· Knowledge building· Maximizing the knowledge and experience of all participants· Increasing equity of participation· Cross-cultural participation· Development of reflective writing skills· Overcoming social isolation· Emotional involvement· Ready access to help and support· Feedback to and direct student contact with the central academic team· Active and interactive participation· Freedom from constraints of time and location· Learner control

In addition, e-mail technology is relatively cheap and simple to use. With menu-driven configurations becoming prevalent, the systems are very user-friendly. With online group discussions, particular the online role-playing, I would like to quote Harasim: "At issue is...how to build upon and retain the complexity of an environment like computer conferencing so that users learn to be critical thinkers by considering issues and ideas from many perspectives" (Harasim, 1990).

While the student engagement and the quality of discussions, two crucial aspects in improving our teaching, would be greatly improved with e-mail used for group discussions, it could mean a very challenging task in terms of writing. For one thing, being less assured about how one writing would be interprets by readers could amount to a deterrent to one's pen. Therefore, turning online group discussions into on-line role plays might be an alternative to overcome this dispositional barrier.

DISADVANTAGES:

The use of e-mail as an aid in classroom instruction could also lead to some undesirable effects. For one thing, at this stage, e-mail is still a limited symbolic representation system void of oratory and graphic appeals. Primarily textual, it is very demanding on our writing abilities in order to avoid misunderstanding. One learner in the class commented that one really have to "be explicitly clear about humorous comments, jokes". Also to assume all learners would always prefer writing to speaking is not warranted. Some learners expressed the frustration about lengthy time spent on going through messages and writing to respond to them while orally, the

12 | P a g e

Page 13: MB0039 Set 1

MB0039 Set1

exchanges could be done in just a few minutes. For people who do like to stare at the screen for too long, much more paper is likely to be consumed for downloading files.

Using e-mail as an instructional aid is also limited to certain kinds of learning. For some learning which would be best picked up through demonstration, e-mail of the current phase certainly could not replace such experiential learning event. Moreover, research still needs to be done to find out to what extent the online discussion could achieve the same dynamics as that of buzz groups or the richness and stimulation of a face-to-face encounter. Not unusually, the very technology may form a new dispositional barrier towards participation, namely, computer anxiety or computerphobics. In one course, when the writer proposed using e-mail for journal writing, it was vehemently objected by a number of learners who obviously have not had good experiences with computers.Cost and access are still major barriers as well, especially when computing services in some schools are being transformed into cost-recovery enterprises. Many of the learners at this University in fact have to rely on the school terminals rather than personal computers to access to free e-mail services. Thus, their freedom in choosing the time and place to be online is questioned.

Five Ways In Which E-mail Message Could Be Made More Effective:

These are the five ways in which E-mail message could make more effective.

1. Mind your “P”'s and “Q”'s - These refer to the three “magic” words, “Please”, “Thank You” and “Sorry”. They are all the more important in E-mail messages which have to be extra polite and friendly.

2. Avoid “shouting” – Shouting in an E-mail message refers to use of all capital letters in the text. All caps make it difficult to read a message and are therefore considered to be rude, like shouting,

3. Use friendly salutation and sign-offs – Although these are not strictly required in E-mail communication as in business letters, a salutation such as “Dear John” and a sign-off such as “Warm Regards”, helps to make the tone friendly and personal.

4. Avoid personal messages at work – Do not make use of the office facility to send personal E-mail message. Science confidentiality of the message is not guaranteed, it may lead embarrassment letter.

5. Avoid sending “junk mail” – Do not send irrelevant message or messages that are not work related, to people at work. If you overload people with this kind of mail, they will not pay attention to the really important message. Email should be used constructively and judiciously, to meet your goals at the workplace and to enhance your performance on the job.

13 | P a g e

Page 14: MB0039 Set 1

MB0039 Set1

Q 5. Write an unsolicited job application letter addressed to the HR Manager of a company of your choice, seeking a position in your area of specialization, along with a one page profile about yourself.

To,

The HR Manager,

Success Builds Pvt. Ltd.

Human Nagar, New think road.

Dear HR Manager,

Sub: Application for the post of safety Engineer

I read the latest article in a business publication that your company own a prestigious contract and understand that you may want to hire qualified safety engineers to service the newly acquired contract.

I am engineering graduate with relevant safety qualification. From the business courses taken during my MBA program, I have learnt how to take the safety demands of clients by implementing all relevant regulatory & statutory safety requirements at project sites.

I had a specialization of Project Management during my MBA. As part of my MBA final year project work, I had taken the topic of implementing safety culture in unorganized sectors like construction. I am currently pursuing an International Diploma in Safety, which is highly relevant to your organization.

Please contact the references in my enclosed resume, for their comments on my knowledge, expertise and interpersonal skills. I would be grateful if you could indicate whether these would be an opening for a safety engineer in your esteemed organization, in the near future.

Thanking you,

Sincerely,

Ramkumar G

14 | P a g e

Page 15: MB0039 Set 1

MB0039 Set1

Enclosures: Resume.

Ramkumar G

Mobile: 0000000001

Email: [email protected]

RESUME

-------------------------------------------------

Professional Objective

Seeking a position in a highly motivated team, that utilizes my skills and abilities and offers professional growth while being resourceful, innovative and flexible.

-------------------------------------------------

Educational Qualification

* Presently Doing MBA from SMU.

* B. Sc. from Human University.

* Diploma in Safety from Human institute of Fire Engineering.

* Intermediate (M.P.C.) From Human Junior College during 2000-2002.

* SSC from Human. Govt. High School, Human Nagar, in 2000.

-------------------------------------------------

Software Skills

CCS Certification from Aptech Computer Education.

Packages : Word, Excel, PowerPoint

DBMS : M.S. Access Language

Tools : HTML, DHTML, Front Page 2000

15 | P a g e

Page 16: MB0039 Set 1

MB0039 Set1

-------------------------------------------------

Personal Profile

Name : Ramkumar G

Father’s Name: God Father

Date of Birth : 1st Jan, 1983

Sex : Male

Marital status : Unmarried

Nationality : INDIAN

Languages Known : English, Hindi

Passport Number : F0000001

-------------------------------------------------

Declaration

I affirm that the information in this application is true and correct. I also fully understand that at any stage it is discovered that any attempt has been made by me to willfully conceal or misrepresent the facts, my candidature may be summarily rejected and my employment terminated.

Date: (Ramkumar G)

Q 6. Case Study The Informal Communication Network In Secunderabad, a maintenance employee of the A to Z Construction Company asked for three months’ leave of absence for personal reasons. The request was granted because it was in keeping with the Company and Union policy. A few weeks later, Mr. Subbaya, the Industrial Relations Manager of A to Z, heard through the “grapevine” that Mr. Reddy, the maintenance employee, had actually taken this leave to work on a construction project in another part of the state. The rumor was that Reddy needed some extra money and had taken up this job since the wages were nearly twice what he earned in his regular maintenance job.

16 | P a g e

Page 17: MB0039 Set 1

MB0039 Set1

The act of taking leave for personal reasons with the hidden purpose of working for another employer was contrary to the labor contract and the penalty for this could be dismissal. After investigation to determine that the grapevine probably was correct, Mr. Subbaya prepared a “Notice of hearing concerning dismissal action” to be mailed to Reddy at his local address. The letter of notice was dictated by Subbaya to his secretary on Monday morning. The same night, Mr. Subbaya received a call from Reddy at his home, saying that he had heard that the notice was being prepared and that he felt that there was a misunderstanding. Reddy said that he thought that his action was acceptable under the contract, but if it was not acceptable, he was willing to return immediately, since he did not want to give up his permanent job. When Subbaya asked him how he knew about his pending dismissal notice, Reddy said that his wife had called him that evening, telling him that at the local supermarket, the mother of their son’s friend had told her about the pending dismissal order. Questions

1. Assume that grapevine facts are as follows –

Subbaya’s secretary told a fringe benefit clerk about the dismissal notice. The clerk, not realizing that the information might be confidential, told someone else. If you were Subbaya, would you try to suppress grapevine leaks of this type? How?

2. After Reddy’s telephone calls, what action should Subbaya take? Discuss.

************

17 | P a g e


Recommended