Print Options

Card layout: ?

← Back to notecard set|Easy Notecards home page

Instructions for Side by Side Printing
  1. Print the notecards
  2. Fold each page in half along the solid vertical line
  3. Cut out the notecards by cutting along each horizontal dotted line
  4. Optional: Glue, tape or staple the ends of each notecard together
  1. Verify Front of pages is selected for Viewing and print the front of the notecards
  2. Select Back of pages for Viewing and print the back of the notecards
    NOTE: Since the back of the pages are printed in reverse order (last page is printed first), keep the pages in the same order as they were after Step 1. Also, be sure to feed the pages in the same direction as you did in Step 1.
  3. Cut out the notecards by cutting along each horizontal and vertical dotted line
To print: Ctrl+PPrint as a list

10 notecards = 3 pages (4 cards per page)

Viewing:

Information management

front 1

Appropriate information management helps a business auld a good reputation by:

back 1

Being consistent

front 2

Which information must a business manage?

back 2

Accounting records

front 3

Which action is part of information management?

back 3

Disseminating information

front 4

Which risk might result from ethical misconduct?

back 4

Decreased company value

front 5

11. During a staff meeting, the company's president states, "Samari Enterprises experienced a three percent increase during the first quarter and a five percent increase during the second quarter of this fiscal year." What type of information is the president providing?

back 5

Explicit knowledge

front 6

14. A business can prevent its trade secrets from further disclosure to third parties by asking the court to issue a/an:

back 6

Injunctions

front 7

To reduce the risk of unauthorized access to confidential data, businesses use security software to protect their:

back 7

Intranet systems

front 8

What is the purpose of a control list in a small-business security audit?

back 8

  1. to prevent people from having access to excess information

front 9

What is the first step in a small-business security audit?

back 9

Defining the audit

front 10

The business owner, Mrs. James, asked the manager, Jade, to create a report of all the security threats that the store has faced in the past and how the threats were handled. Which phase of the small-business security audit was she asking for?

back 10

learning from the past and considering future threats