Free

MGMT442 U1 IP - Research Paper Example

Comments (0) Cite this document
Summary
Most importantly they should be aligned with the vision of the new entity and work towards achieving set objectives. This question should elaborate…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.6% of users find it useful
MGMT442 U1 IP
Read TextPreview

Extract of sample "MGMT442 U1 IP"

Running Head: MGMT442 U1 IP MGMT442 U1 IP Teacher’s ID Q1. During your career, what are your most successful initiatives? Something that you are proud of or can quote as your achievement?
The candidate should have experience of setting up a new service department in similar industry. If not, he should exhibit that he has entrepreneurial qualities and can take initiatives.
Q2. While taking such initiatives, did you ever-encountered resistance (related to both material and human) and how did you managed it?
This question should elaborate the interpersonal skills along with controlling and management skills of the candidate.
Q3. Can you give some examples of your achievements as a team player or while heading a team? What was your role? How do you motivate your team?
When establishing a new entity or department you need an energetic team, full of passion for work and hungry for success. Most importantly they should be aligned with the vision of the new entity and work towards achieving set objectives. This question should elaborate candidate’s motivational and change management skills along with the ability to set a vision and align team members towards it (Collins, 2001).
Q4. What have you done with bad eggs in your team? Have you hired any yourself? Have you been proven wrong when it comes to judging people?
This is where the candidate exhibits his temperament and coaching skills. Ideally, his answer should elaborate an instance where he counseled or helped a bad performing employee resulting in improved performance and realignment with team’s objectives (Krogerus & Tschappeler, 2008). The candidate may quote how he had to let go of a team member after all his coaching failed.
Q5. How would you define your leadership style?
In real life, a team leader has to switch between a person who can control and someone who participates in work if required. The role is won through experience and knowledge but maintained by instilling trust and promoting candor between amongst the team members (Collins, 2001). Another aspect important in this job is promoting a high performing culture; the team members should compete amongst themselves for rewards based on merit.
Q6. When providing services what elements are important for you? And when setting up a services department, what are the elements you would consider while planning?
Here, the candidate must elaborate his knowledge and skills related to customer services. The means used to maintain and monitor service levels along with quality of customer services provided. It is also important that the incumbent must be aware of trends and technologies used in the service area by the firm’s competitors. Furthermore candidate must be aware of skill requirements both short and in long term (Krogerus & Tschappeler, 2008).
Q7. Would you be able to initiate and setup a service department from scratch? In what time period do you think you can make this department functioning at par with other competitors?
It is important that the interviewer must present the challenge that comes with this job. A demotivated, nervous and immature candidate would exhibit uncertainty, while the right incumbent would lay out a blue print of the plan right there and then. Furthermore it is important that the incumbent must elaborate what initial steps he would take in order to setup this department along with an approximate time period. This answer would indicate how the incumbents perform planning, organizing and controlling functions (Krogerus & Tschappeler, 2008).
References
Collins, J. (2001). Good to Great: Why Some Companies Make the Leap and Others Don’t. Harper Business.
Krogerus, M. & Tschappeler, R. (2008). The Decision Book: Fifty models for Strategic Thinking. Rizzoli. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“MGMT442 U1 IP Research Paper Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.org/human-resources/1649319-mgmt442-u1-ip
(MGMT442 U1 IP Research Paper Example | Topics and Well Written Essays - 500 Words)
https://studentshare.org/human-resources/1649319-mgmt442-u1-ip.
“MGMT442 U1 IP Research Paper Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/human-resources/1649319-mgmt442-u1-ip.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF MGMT442 U1 IP

Northrop Grumman U1

...UNIT BUSINESS APPLICATION ASSIGNMENT goes here] [Your goes here] [Due the paper] Northrop Grumman Corporation Introduction The name of the company that we have selected for review is Northrop Grumman Corporation. Northrop Grumman is an American company that offers defense technologies and cyber security systems to meet the demands of emerging security challenges of the world. “Cyberattacks have become a big concern for companies, and the US and foreign governments” (Maurer, 2012). Northrop Grumman deals with cyber attacks, as well as with four other business sectors that include aerospace systems, electronic systems, information systems, and technical services. I was interested in knowing different defense systems and technologies...
2 Pages(500 words)Essay

MGMT444 U1 IP

...Running Head: MGMT444 U1 IP MGMT444 U1 IP Teacher’s ID Since it is a senior level position, the candi is expected to have an ability of taking initiatives and taking charge of projects and day-to-day tasks. Please tell us how you were performing these tasks in your current job. Also what kind of projects and ideas you have introduced yourself during your career. This question is expected to indicate if the candidate is creative enough to introduce new ideas and take control of situations like a business leader. 2) We need someone who has 360 degree vision of everything going around them as leaving out necessary information means losing productivity and foresight for...
2 Pages(500 words)Research Paper

MGMT442 U3 DB

...In the modern times the organizations are bound to provide the employees with such set of conditions that will allow for benefiting the individuals and in turn the organization. A set of these factors can be deducted. The following are three basic elements and developmental activities that the organizations must provide the employees with: During the job training and skill development technique Interpersonal communication development skill and techniques Incorporating a holistic approach and bringing about dynamic working environment (Davis, 2008). Each of these important due to the fact the modern times are highly competitive and driven by excessive competition and demands from the clients end. Each of the three allows catering... the modern ...
1 Pages(250 words)Research Paper

MGMT442 U5 DB

...Employee Communication Programs Affiliation: Communication programs can be effectively utilized if the employees are also allowed to control or at least have a controlling share of the program other than it being controlled by the management alone. This is so because when the employees have part control, they will own the program and hence utilize it more effectively to communicate and have assurance that their communication is heard and passed to the necessary people. Frequent changes should also be made to the communication programs with advancement in communication and technological equipment (Wrench, 2013). Employers and employees can be able to pass information about the needs of their customers faster and get quicker... Communication...
1 Pages(250 words)Research Paper

MGMT455 U1 IP Theory X & Y

...Research Paper [Pick the Theory X and Theory Y The concept of Theory X and Theory Y was introduced by a Social Psychologist Douglas McGregor and it was published in 1960 in his book “The Human Side of Enterprise. The fundamental idea of McGregor was to explain the behaviors of the individuals and the applied management styles. He introduced two expounded theories, “Theory X and Theory Y”. The Theory X assumes that individuals does not like working, they tend to avoid responsibilities and for that purpose they need to be controlled and supervised on each step of their work otherwise they will not be able to produce the beneficial results. This theory tends to adopt the authoritarian style of management. Whereas, Theory Y assumes... Paper [Pick ...
2 Pages(500 words)Research Paper

MGMT458 U1 IP AVON

...AVON Mission ment Question Avon’s vision and mission is “To be the company that understands and satisfies the products, services and self-fulfillment needs of women-globally” (Avon, 2014). They represent empowering women by offering job opportunities; fighting breast cancer and domestic violence. To achieve a healthy balance between employees’ personal and work life, Avon offers benefits such as service rewards, health care, employee assistant programs, child care vouchers, annual leave entitlement, and flexible work hours to name a few (Avon, 2014). "Avons mission is centered on six-center yearnings the organization consistently strives to attain," starts Avons Mission statement. At that point, it goes on. It weighs in at 249... Mission...
2 Pages(500 words)Research Paper

U1 Discussion

...Cause of IP Address Conflict and its Resolution s Cause of IP Address Conflict and its Resolution As a network administrator, I am tasked with maintaining the computer software and hardware systems which make up the computer network, such as, monitoring and maintaining of either converged infrastructure or active data network, monitoring network traffic, testing the network for weakness, and installing and implementing security programs (Bautts, Dawson, & Purdy, 2010). The Dynamic Host Configuration Protocol (DHCP) is a network protocol which enables the server to assign automatically an IP address to a computer from a definite scope configured from a certain network. The DCHP allows the...
1 Pages(250 words)Coursework

CIS 206 U1 Discussion

...Fedora Comparison to other Linux Distributions School Linux operating system has many distributions that come up with several operating systems. The major operating systems and distributions are Debian, Ubuntu, Arch, and Red hat. Debian distribution produces operating systems like Ubuntu while Red-hat produces fedora and arch produce the Arch Linux. Other notable Linux distributions include OpenSuse, CentOS, Mint, Mandriva and Kali Linux formerly backtrack. In the text, we will focus on Fedora, Ubuntu and Arch Linux. Fedora started in 2002 as a spun off from an undergraduate project called Fedora Linux and is supported by the open-source community. Ubuntu is a fork of Debian, that is on of the oldest Linux distributions available...
1 Pages(250 words)Essay

CIS212 U1 Discussion

...is with reviewing of the security mechanisms to ascertain and ensure that frequent testing is done on them and maintained as well. There are various common means of authentication. The notion is to get the victim known to be what they allude to be. Essentially there is user authentication and entity authentication. As a result, we have form authentication that entails passing in a username and password on web pages to gain access. Cookies are authentication mechanisms as a means to achieve entity authentication. It accomplishes this through the use of sessions. Authentication at the infrastructure will involve the use of DNS names. They are applicable where applications need to allow access to other hosts. In addition, there is spoofing...
1 Pages(250 words)Essay

CIS212 U1 Review

...Nuclear Plant Password Policy Insert Insert Activity 1 As an information officer, what are the information security goals that you need to keep in mind while defining the protection you shall need?(Select all that apply.) The goals are detection, prevention, and recovery 2) What are applicable forms of vulnerabilities? (select all that apply) They include improperly configured software, misuse of communication protocols and damage to Hardware 3) Detail the difference between a threat, vulnerability, and a risk. A threat is anything that poses the danger to the computer system whereas vulnerability refers to a loophole or a weakness that hackers or attackers can use to attack a system. Atheotherhandlikelihoodloss... Plant Password Policy...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic MGMT442 U1 IP for FREE!

Contact Us