CAT Exam  >  CAT Questions  >   Direction: Answer the questions based on the... Start Learning for Free
Direction: Answer the questions based on the information given below:
Sita is the Senior Human Resource (HR) Manager for the company Digitax Markex. Last year, she hired 3 people during campus placements of a leading management college. These 3: Denny, Penny and Kenny were hired for mid-management roles. None of them have experience in having worked with a firm prior or post their management degree. Next week, their annual appraisal meeting is scheduled with the senior management and Sita. Before this, Sita must email her assessment report on all the three to the senior management.
After the appraisal meeting, Penny realised that unlike Kenny and Denny who received a 30% increment in their salary, she has received only 20%. Deeply offended by this, she writes an email of resignation to Sita quoting the lower increment as the reason. Penny also mentions that this reflects gender inequality on the company's part. On reading the email, the following courses of action cross Sita's mind:
1. Start looking for another employee as Penny's replacement.
2. Call a meeting with Penny to explain to her that increments are based of multiple factors like the gross salary offered at the time of joining, quarterly performance, the department, job role, etc.
3. Write an email to all employees reminding them that salary information must be kept confidential in accordance with the company policy.
4. Immediately arrange for another appraisal meeting to offer Penny an equal raise.
5. Transfer Penny to another department.
Which of the following is the odd one out when the above statements are arranged in descending order of appropriateness?
  • a)
    2, 3, 1
  • b)
    3, 1, 5
  • c)
    2, 1, 4
  • d)
    5, 3, 2
Correct answer is option 'D'. Can you explain this answer?
Most Upvoted Answer
Direction: Answer the questions based on the information given below:...
Under the given circumstances, 2 and 3 are appropriate and logical measures; 1 seems as a precautionary measure; whereas 4 and 5 are the most inappropriate steps. Given that the statements must be arranged from the most appropriate to the least appropriate one, only option D acts as the odd one out as an inappropriate step is followed by the appropriate one.
Attention CAT Students!
To make sure you are not studying endlessly, EduRev has designed CAT study material, with Structured Courses, Videos, & Test Series. Plus get personalized analysis, doubt solving and improvement plans to achieve a great score in CAT.
Explore Courses for CAT exam

Similar CAT Doubts

Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electroni c) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NS

Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electroni c) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NS

Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electroni c) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NS

Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electroni c) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NS

Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electroni c) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NS

Top Courses for CAT

Direction: Answer the questions based on the information given below:Sita is the Senior Human Resource (HR) Manager for the company Digitax Markex. Last year, she hired 3 people during campus placements of a leading management college. These 3: Denny, Penny and Kenny were hired for mid-management roles. None of them have experience in having worked with a firm prior or post their management degree. Next week, their annual appraisal meeting is scheduled with the senior management and Sita. Before this, Sita must email her assessment report on all the three to the senior management.After the appraisal meeting, Penny realised that unlike Kenny and Denny who received a 30% increment in their salary, she has received only 20%. Deeply offended by this, she writes an email of resignation to Sita quoting the lower increment as the reason. Penny also mentions that this reflects gender inequality on the company's part. On reading the email, the following courses of action cross Sita's mind:1. Start looking for another employee as Penny's replacement.2. Call a meeting with Penny to explain to her that increments are based of multiple factors like the gross salary offered at the time of joining, quarterly performance, the department, job role, etc.3. Write an email to all employees reminding them that salary information must be kept confidential in accordance with the company policy.4. Immediately arrange for another appraisal meeting to offer Penny an equal raise.5. Transfer Penny to another department.Which of the following is the odd one out when the above statements are arranged in descending order of appropriateness?a)2, 3, 1b)3, 1, 5c)2, 1, 4d)5, 3, 2Correct answer is option 'D'. Can you explain this answer?
Question Description
Direction: Answer the questions based on the information given below:Sita is the Senior Human Resource (HR) Manager for the company Digitax Markex. Last year, she hired 3 people during campus placements of a leading management college. These 3: Denny, Penny and Kenny were hired for mid-management roles. None of them have experience in having worked with a firm prior or post their management degree. Next week, their annual appraisal meeting is scheduled with the senior management and Sita. Before this, Sita must email her assessment report on all the three to the senior management.After the appraisal meeting, Penny realised that unlike Kenny and Denny who received a 30% increment in their salary, she has received only 20%. Deeply offended by this, she writes an email of resignation to Sita quoting the lower increment as the reason. Penny also mentions that this reflects gender inequality on the company's part. On reading the email, the following courses of action cross Sita's mind:1. Start looking for another employee as Penny's replacement.2. Call a meeting with Penny to explain to her that increments are based of multiple factors like the gross salary offered at the time of joining, quarterly performance, the department, job role, etc.3. Write an email to all employees reminding them that salary information must be kept confidential in accordance with the company policy.4. Immediately arrange for another appraisal meeting to offer Penny an equal raise.5. Transfer Penny to another department.Which of the following is the odd one out when the above statements are arranged in descending order of appropriateness?a)2, 3, 1b)3, 1, 5c)2, 1, 4d)5, 3, 2Correct answer is option 'D'. Can you explain this answer? for CAT 2024 is part of CAT preparation. The Question and answers have been prepared according to the CAT exam syllabus. Information about Direction: Answer the questions based on the information given below:Sita is the Senior Human Resource (HR) Manager for the company Digitax Markex. Last year, she hired 3 people during campus placements of a leading management college. These 3: Denny, Penny and Kenny were hired for mid-management roles. None of them have experience in having worked with a firm prior or post their management degree. Next week, their annual appraisal meeting is scheduled with the senior management and Sita. Before this, Sita must email her assessment report on all the three to the senior management.After the appraisal meeting, Penny realised that unlike Kenny and Denny who received a 30% increment in their salary, she has received only 20%. Deeply offended by this, she writes an email of resignation to Sita quoting the lower increment as the reason. Penny also mentions that this reflects gender inequality on the company's part. On reading the email, the following courses of action cross Sita's mind:1. Start looking for another employee as Penny's replacement.2. Call a meeting with Penny to explain to her that increments are based of multiple factors like the gross salary offered at the time of joining, quarterly performance, the department, job role, etc.3. Write an email to all employees reminding them that salary information must be kept confidential in accordance with the company policy.4. Immediately arrange for another appraisal meeting to offer Penny an equal raise.5. Transfer Penny to another department.Which of the following is the odd one out when the above statements are arranged in descending order of appropriateness?a)2, 3, 1b)3, 1, 5c)2, 1, 4d)5, 3, 2Correct answer is option 'D'. Can you explain this answer? covers all topics & solutions for CAT 2024 Exam. Find important definitions, questions, meanings, examples, exercises and tests below for Direction: Answer the questions based on the information given below:Sita is the Senior Human Resource (HR) Manager for the company Digitax Markex. Last year, she hired 3 people during campus placements of a leading management college. These 3: Denny, Penny and Kenny were hired for mid-management roles. None of them have experience in having worked with a firm prior or post their management degree. Next week, their annual appraisal meeting is scheduled with the senior management and Sita. Before this, Sita must email her assessment report on all the three to the senior management.After the appraisal meeting, Penny realised that unlike Kenny and Denny who received a 30% increment in their salary, she has received only 20%. Deeply offended by this, she writes an email of resignation to Sita quoting the lower increment as the reason. Penny also mentions that this reflects gender inequality on the company's part. On reading the email, the following courses of action cross Sita's mind:1. Start looking for another employee as Penny's replacement.2. Call a meeting with Penny to explain to her that increments are based of multiple factors like the gross salary offered at the time of joining, quarterly performance, the department, job role, etc.3. Write an email to all employees reminding them that salary information must be kept confidential in accordance with the company policy.4. Immediately arrange for another appraisal meeting to offer Penny an equal raise.5. Transfer Penny to another department.Which of the following is the odd one out when the above statements are arranged in descending order of appropriateness?a)2, 3, 1b)3, 1, 5c)2, 1, 4d)5, 3, 2Correct answer is option 'D'. Can you explain this answer?.
Solutions for Direction: Answer the questions based on the information given below:Sita is the Senior Human Resource (HR) Manager for the company Digitax Markex. Last year, she hired 3 people during campus placements of a leading management college. These 3: Denny, Penny and Kenny were hired for mid-management roles. None of them have experience in having worked with a firm prior or post their management degree. Next week, their annual appraisal meeting is scheduled with the senior management and Sita. Before this, Sita must email her assessment report on all the three to the senior management.After the appraisal meeting, Penny realised that unlike Kenny and Denny who received a 30% increment in their salary, she has received only 20%. Deeply offended by this, she writes an email of resignation to Sita quoting the lower increment as the reason. Penny also mentions that this reflects gender inequality on the company's part. On reading the email, the following courses of action cross Sita's mind:1. Start looking for another employee as Penny's replacement.2. Call a meeting with Penny to explain to her that increments are based of multiple factors like the gross salary offered at the time of joining, quarterly performance, the department, job role, etc.3. Write an email to all employees reminding them that salary information must be kept confidential in accordance with the company policy.4. Immediately arrange for another appraisal meeting to offer Penny an equal raise.5. Transfer Penny to another department.Which of the following is the odd one out when the above statements are arranged in descending order of appropriateness?a)2, 3, 1b)3, 1, 5c)2, 1, 4d)5, 3, 2Correct answer is option 'D'. Can you explain this answer? in English & in Hindi are available as part of our courses for CAT. Download more important topics, notes, lectures and mock test series for CAT Exam by signing up for free.
Here you can find the meaning of Direction: Answer the questions based on the information given below:Sita is the Senior Human Resource (HR) Manager for the company Digitax Markex. Last year, she hired 3 people during campus placements of a leading management college. These 3: Denny, Penny and Kenny were hired for mid-management roles. None of them have experience in having worked with a firm prior or post their management degree. Next week, their annual appraisal meeting is scheduled with the senior management and Sita. Before this, Sita must email her assessment report on all the three to the senior management.After the appraisal meeting, Penny realised that unlike Kenny and Denny who received a 30% increment in their salary, she has received only 20%. Deeply offended by this, she writes an email of resignation to Sita quoting the lower increment as the reason. Penny also mentions that this reflects gender inequality on the company's part. On reading the email, the following courses of action cross Sita's mind:1. Start looking for another employee as Penny's replacement.2. Call a meeting with Penny to explain to her that increments are based of multiple factors like the gross salary offered at the time of joining, quarterly performance, the department, job role, etc.3. Write an email to all employees reminding them that salary information must be kept confidential in accordance with the company policy.4. Immediately arrange for another appraisal meeting to offer Penny an equal raise.5. Transfer Penny to another department.Which of the following is the odd one out when the above statements are arranged in descending order of appropriateness?a)2, 3, 1b)3, 1, 5c)2, 1, 4d)5, 3, 2Correct answer is option 'D'. Can you explain this answer? defined & explained in the simplest way possible. Besides giving the explanation of Direction: Answer the questions based on the information given below:Sita is the Senior Human Resource (HR) Manager for the company Digitax Markex. Last year, she hired 3 people during campus placements of a leading management college. These 3: Denny, Penny and Kenny were hired for mid-management roles. None of them have experience in having worked with a firm prior or post their management degree. Next week, their annual appraisal meeting is scheduled with the senior management and Sita. Before this, Sita must email her assessment report on all the three to the senior management.After the appraisal meeting, Penny realised that unlike Kenny and Denny who received a 30% increment in their salary, she has received only 20%. Deeply offended by this, she writes an email of resignation to Sita quoting the lower increment as the reason. Penny also mentions that this reflects gender inequality on the company's part. On reading the email, the following courses of action cross Sita's mind:1. Start looking for another employee as Penny's replacement.2. Call a meeting with Penny to explain to her that increments are based of multiple factors like the gross salary offered at the time of joining, quarterly performance, the department, job role, etc.3. Write an email to all employees reminding them that salary information must be kept confidential in accordance with the company policy.4. Immediately arrange for another appraisal meeting to offer Penny an equal raise.5. Transfer Penny to another department.Which of the following is the odd one out when the above statements are arranged in descending order of appropriateness?a)2, 3, 1b)3, 1, 5c)2, 1, 4d)5, 3, 2Correct answer is option 'D'. Can you explain this answer?, a detailed solution for Direction: Answer the questions based on the information given below:Sita is the Senior Human Resource (HR) Manager for the company Digitax Markex. Last year, she hired 3 people during campus placements of a leading management college. These 3: Denny, Penny and Kenny were hired for mid-management roles. None of them have experience in having worked with a firm prior or post their management degree. Next week, their annual appraisal meeting is scheduled with the senior management and Sita. Before this, Sita must email her assessment report on all the three to the senior management.After the appraisal meeting, Penny realised that unlike Kenny and Denny who received a 30% increment in their salary, she has received only 20%. Deeply offended by this, she writes an email of resignation to Sita quoting the lower increment as the reason. Penny also mentions that this reflects gender inequality on the company's part. On reading the email, the following courses of action cross Sita's mind:1. Start looking for another employee as Penny's replacement.2. Call a meeting with Penny to explain to her that increments are based of multiple factors like the gross salary offered at the time of joining, quarterly performance, the department, job role, etc.3. Write an email to all employees reminding them that salary information must be kept confidential in accordance with the company policy.4. Immediately arrange for another appraisal meeting to offer Penny an equal raise.5. Transfer Penny to another department.Which of the following is the odd one out when the above statements are arranged in descending order of appropriateness?a)2, 3, 1b)3, 1, 5c)2, 1, 4d)5, 3, 2Correct answer is option 'D'. Can you explain this answer? has been provided alongside types of Direction: Answer the questions based on the information given below:Sita is the Senior Human Resource (HR) Manager for the company Digitax Markex. Last year, she hired 3 people during campus placements of a leading management college. These 3: Denny, Penny and Kenny were hired for mid-management roles. None of them have experience in having worked with a firm prior or post their management degree. Next week, their annual appraisal meeting is scheduled with the senior management and Sita. Before this, Sita must email her assessment report on all the three to the senior management.After the appraisal meeting, Penny realised that unlike Kenny and Denny who received a 30% increment in their salary, she has received only 20%. Deeply offended by this, she writes an email of resignation to Sita quoting the lower increment as the reason. Penny also mentions that this reflects gender inequality on the company's part. On reading the email, the following courses of action cross Sita's mind:1. Start looking for another employee as Penny's replacement.2. Call a meeting with Penny to explain to her that increments are based of multiple factors like the gross salary offered at the time of joining, quarterly performance, the department, job role, etc.3. Write an email to all employees reminding them that salary information must be kept confidential in accordance with the company policy.4. Immediately arrange for another appraisal meeting to offer Penny an equal raise.5. Transfer Penny to another department.Which of the following is the odd one out when the above statements are arranged in descending order of appropriateness?a)2, 3, 1b)3, 1, 5c)2, 1, 4d)5, 3, 2Correct answer is option 'D'. Can you explain this answer? theory, EduRev gives you an ample number of questions to practice Direction: Answer the questions based on the information given below:Sita is the Senior Human Resource (HR) Manager for the company Digitax Markex. Last year, she hired 3 people during campus placements of a leading management college. These 3: Denny, Penny and Kenny were hired for mid-management roles. None of them have experience in having worked with a firm prior or post their management degree. Next week, their annual appraisal meeting is scheduled with the senior management and Sita. Before this, Sita must email her assessment report on all the three to the senior management.After the appraisal meeting, Penny realised that unlike Kenny and Denny who received a 30% increment in their salary, she has received only 20%. Deeply offended by this, she writes an email of resignation to Sita quoting the lower increment as the reason. Penny also mentions that this reflects gender inequality on the company's part. On reading the email, the following courses of action cross Sita's mind:1. Start looking for another employee as Penny's replacement.2. Call a meeting with Penny to explain to her that increments are based of multiple factors like the gross salary offered at the time of joining, quarterly performance, the department, job role, etc.3. Write an email to all employees reminding them that salary information must be kept confidential in accordance with the company policy.4. Immediately arrange for another appraisal meeting to offer Penny an equal raise.5. Transfer Penny to another department.Which of the following is the odd one out when the above statements are arranged in descending order of appropriateness?a)2, 3, 1b)3, 1, 5c)2, 1, 4d)5, 3, 2Correct answer is option 'D'. Can you explain this answer? tests, examples and also practice CAT tests.
Explore Courses for CAT exam

Top Courses for CAT

Explore Courses
Signup for Free!
Signup to see your scores go up within 7 days! Learn & Practice with 1000+ FREE Notes, Videos & Tests.
10M+ students study on EduRev