SlideShare a Scribd company logo
Essay Question -2
1
You have just participated in an important meeting with your superior. How will you ensure that every
part of the instructions you received will properly reach all subordinates, suppliers and clients,
located in different parts of the world?
The process to pass up the instructions efficiently to all subordinates, suppliers and client will
compromise of three stages which are enlisted as follows
 Data collection.
 Information sharing.
 Follow up.
2
Meeting with Superior  Analyze the instruction and due intent of the instruction. If in doubt, verify the intent
of the instructions by re-discussing with superior.
 Identify and list the share holders ( Sub ordinates, Suppliers & clients) to whom
information has to be sent.
 Identify the common language each share holder is comfortable with.
 Identify special needs ( language ) of specific share holders.
 Divide the information in confidential information and information meant for team
as a whole.
 Anticipate the additional data the subordinates, supplier and client may need or
the questions they may ask. Get adequate information in advance to clarify their
possible concerns.
 Document the instructions using a suitable format.
s.no Agenda Point Discussions Action Points Responsbility Review date Target closure date
Datacollection
Data collection
3
 If large documents to be supplied as supporting document , identify the storage mechanism and data
retrieval mechanism which is accessible to concerned people.
 Share data through agreed mechanism. ( official email, Post)
 Define format for sharing information.
s.no Agenda Point Discussions Action Points Responsbility Review date Target closure date
InformationSharingFollowup
 Make phone calls to ensure key members to clarify doubts. points are clearly understood.
 If required, call teleconference/video conference with team
Information sharing and follow up
4
Thank you
5

More Related Content

Similar to Essay 2

3 Best Practices for eDiscovery Custodian Interviews
3 Best Practices for eDiscovery Custodian Interviews3 Best Practices for eDiscovery Custodian Interviews
3 Best Practices for eDiscovery Custodian Interviews
D4
 
NCV 3 Management Practice Hands-On Support Slide Show - Module 4
NCV 3 Management Practice Hands-On Support Slide Show - Module 4NCV 3 Management Practice Hands-On Support Slide Show - Module 4
NCV 3 Management Practice Hands-On Support Slide Show - Module 4
Future Managers
 
Pp ie
Pp iePp ie
LESSON 2.pptx
LESSON 2.pptxLESSON 2.pptx
LESSON 2.pptx
veenitadebnath1
 
Int proj3 andrea vallejo judith machisaca. book report. part iv
Int proj3 andrea vallejo judith machisaca. book report. part ivInt proj3 andrea vallejo judith machisaca. book report. part iv
Int proj3 andrea vallejo judith machisaca. book report. part iv
andrevallejo1217
 
Iemiaf application communicationplan
Iemiaf application communicationplanIemiaf application communicationplan
Iemiaf application communicationplan
Priyanka Chopra
 
AssignmentCourse TitleHND in Business Management Studen.docx
AssignmentCourse TitleHND in Business Management Studen.docxAssignmentCourse TitleHND in Business Management Studen.docx
AssignmentCourse TitleHND in Business Management Studen.docx
edmondpburgess27164
 
ASSIGNMENT 21. Draft a legal memorandum in which you discuss t.docx
ASSIGNMENT 21. Draft a legal memorandum in which you discuss t.docxASSIGNMENT 21. Draft a legal memorandum in which you discuss t.docx
ASSIGNMENT 21. Draft a legal memorandum in which you discuss t.docx
ursabrooks36447
 
Communication Infrastructure Strategy Essay Discussion Paper.docx
Communication Infrastructure Strategy Essay Discussion Paper.docxCommunication Infrastructure Strategy Essay Discussion Paper.docx
Communication Infrastructure Strategy Essay Discussion Paper.docx
4934bk
 
3Individual Assignment Social, Ethical and Legal Implicat.docx
3Individual Assignment Social, Ethical and Legal Implicat.docx3Individual Assignment Social, Ethical and Legal Implicat.docx
3Individual Assignment Social, Ethical and Legal Implicat.docx
rhetttrevannion
 
Ingl 3116 vocabulary chap 1, 4, 15, 16
Ingl 3116 vocabulary chap 1, 4, 15, 16Ingl 3116 vocabulary chap 1, 4, 15, 16
Ingl 3116 vocabulary chap 1, 4, 15, 16
aramnoemi
 
Chapter 6, message design
Chapter 6, message designChapter 6, message design
Chapter 6, message design
Akshay Kumar
 
Module 2 part 6 and writing plan
Module 2 part 6 and writing planModule 2 part 6 and writing plan
Module 2 part 6 and writing plan
Paula Nottingham
 
Social Software Is About People and Business Process
Social Software Is About People and Business ProcessSocial Software Is About People and Business Process
Social Software Is About People and Business Process
Blue Economy Agency
 
Asking the Right QuestionsConvincing others to buy into an i.docx
Asking the Right QuestionsConvincing others to buy into an i.docxAsking the Right QuestionsConvincing others to buy into an i.docx
Asking the Right QuestionsConvincing others to buy into an i.docx
cargillfilberto
 
Altus Alliance 2016 - Tech Funding Proposal Building
Altus Alliance 2016 - Tech Funding Proposal BuildingAltus Alliance 2016 - Tech Funding Proposal Building
Altus Alliance 2016 - Tech Funding Proposal Building
Sparkrock
 
Internet Intelligence Approach
Internet Intelligence ApproachInternet Intelligence Approach
Internet Intelligence Approach
Intelegia Group
 
Importance of business communication for developing buyer
Importance of business communication for developing buyerImportance of business communication for developing buyer
Importance of business communication for developing buyer
Akash Islam
 
BSBCMM511.pptx
BSBCMM511.pptxBSBCMM511.pptx
BSBCMM511.pptx
zomakassignments
 
Alliance situation room how to stay cool and keep smiling when youre in the h...
Alliance situation room how to stay cool and keep smiling when youre in the h...Alliance situation room how to stay cool and keep smiling when youre in the h...
Alliance situation room how to stay cool and keep smiling when youre in the h...
Subhojit Roye
 

Similar to Essay 2 (20)

3 Best Practices for eDiscovery Custodian Interviews
3 Best Practices for eDiscovery Custodian Interviews3 Best Practices for eDiscovery Custodian Interviews
3 Best Practices for eDiscovery Custodian Interviews
 
NCV 3 Management Practice Hands-On Support Slide Show - Module 4
NCV 3 Management Practice Hands-On Support Slide Show - Module 4NCV 3 Management Practice Hands-On Support Slide Show - Module 4
NCV 3 Management Practice Hands-On Support Slide Show - Module 4
 
Pp ie
Pp iePp ie
Pp ie
 
LESSON 2.pptx
LESSON 2.pptxLESSON 2.pptx
LESSON 2.pptx
 
Int proj3 andrea vallejo judith machisaca. book report. part iv
Int proj3 andrea vallejo judith machisaca. book report. part ivInt proj3 andrea vallejo judith machisaca. book report. part iv
Int proj3 andrea vallejo judith machisaca. book report. part iv
 
Iemiaf application communicationplan
Iemiaf application communicationplanIemiaf application communicationplan
Iemiaf application communicationplan
 
AssignmentCourse TitleHND in Business Management Studen.docx
AssignmentCourse TitleHND in Business Management Studen.docxAssignmentCourse TitleHND in Business Management Studen.docx
AssignmentCourse TitleHND in Business Management Studen.docx
 
ASSIGNMENT 21. Draft a legal memorandum in which you discuss t.docx
ASSIGNMENT 21. Draft a legal memorandum in which you discuss t.docxASSIGNMENT 21. Draft a legal memorandum in which you discuss t.docx
ASSIGNMENT 21. Draft a legal memorandum in which you discuss t.docx
 
Communication Infrastructure Strategy Essay Discussion Paper.docx
Communication Infrastructure Strategy Essay Discussion Paper.docxCommunication Infrastructure Strategy Essay Discussion Paper.docx
Communication Infrastructure Strategy Essay Discussion Paper.docx
 
3Individual Assignment Social, Ethical and Legal Implicat.docx
3Individual Assignment Social, Ethical and Legal Implicat.docx3Individual Assignment Social, Ethical and Legal Implicat.docx
3Individual Assignment Social, Ethical and Legal Implicat.docx
 
Ingl 3116 vocabulary chap 1, 4, 15, 16
Ingl 3116 vocabulary chap 1, 4, 15, 16Ingl 3116 vocabulary chap 1, 4, 15, 16
Ingl 3116 vocabulary chap 1, 4, 15, 16
 
Chapter 6, message design
Chapter 6, message designChapter 6, message design
Chapter 6, message design
 
Module 2 part 6 and writing plan
Module 2 part 6 and writing planModule 2 part 6 and writing plan
Module 2 part 6 and writing plan
 
Social Software Is About People and Business Process
Social Software Is About People and Business ProcessSocial Software Is About People and Business Process
Social Software Is About People and Business Process
 
Asking the Right QuestionsConvincing others to buy into an i.docx
Asking the Right QuestionsConvincing others to buy into an i.docxAsking the Right QuestionsConvincing others to buy into an i.docx
Asking the Right QuestionsConvincing others to buy into an i.docx
 
Altus Alliance 2016 - Tech Funding Proposal Building
Altus Alliance 2016 - Tech Funding Proposal BuildingAltus Alliance 2016 - Tech Funding Proposal Building
Altus Alliance 2016 - Tech Funding Proposal Building
 
Internet Intelligence Approach
Internet Intelligence ApproachInternet Intelligence Approach
Internet Intelligence Approach
 
Importance of business communication for developing buyer
Importance of business communication for developing buyerImportance of business communication for developing buyer
Importance of business communication for developing buyer
 
BSBCMM511.pptx
BSBCMM511.pptxBSBCMM511.pptx
BSBCMM511.pptx
 
Alliance situation room how to stay cool and keep smiling when youre in the h...
Alliance situation room how to stay cool and keep smiling when youre in the h...Alliance situation room how to stay cool and keep smiling when youre in the h...
Alliance situation room how to stay cool and keep smiling when youre in the h...
 

Recently uploaded

Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 

Recently uploaded (20)

Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 

Essay 2

  • 2. You have just participated in an important meeting with your superior. How will you ensure that every part of the instructions you received will properly reach all subordinates, suppliers and clients, located in different parts of the world? The process to pass up the instructions efficiently to all subordinates, suppliers and client will compromise of three stages which are enlisted as follows  Data collection.  Information sharing.  Follow up. 2
  • 3. Meeting with Superior  Analyze the instruction and due intent of the instruction. If in doubt, verify the intent of the instructions by re-discussing with superior.  Identify and list the share holders ( Sub ordinates, Suppliers & clients) to whom information has to be sent.  Identify the common language each share holder is comfortable with.  Identify special needs ( language ) of specific share holders.  Divide the information in confidential information and information meant for team as a whole.  Anticipate the additional data the subordinates, supplier and client may need or the questions they may ask. Get adequate information in advance to clarify their possible concerns.  Document the instructions using a suitable format. s.no Agenda Point Discussions Action Points Responsbility Review date Target closure date Datacollection Data collection 3
  • 4.  If large documents to be supplied as supporting document , identify the storage mechanism and data retrieval mechanism which is accessible to concerned people.  Share data through agreed mechanism. ( official email, Post)  Define format for sharing information. s.no Agenda Point Discussions Action Points Responsbility Review date Target closure date InformationSharingFollowup  Make phone calls to ensure key members to clarify doubts. points are clearly understood.  If required, call teleconference/video conference with team Information sharing and follow up 4