Type
Word Search
Description

IceBreaker
Quarantine
Covid
Parkcenter
Bundtcakes
Assets
Christiana
Tamara
Scott
Jeff
Sharon
Karen
Agency
Atlanta
Dobill

Finance Word Search

Type
Word Search
Description

Rights
Lease
Variable
Sale
Profit
Partnership
Expenses
Leverage
Liability
Investor
Equality
Dividend
Loan
Default
Debit
Credit Card
Credit History
Corporation
Capital
Business Plan
Audit
Asset
Annual Meeting
Job
Banking
Economics
Financial Affairs
Investment
Commerce
Accounts
Business
Manage
Budget
Money
Bank

Family Tree Crossword

Type
Crossword
Description

who is Norma's oldest daughter Karen
Who is Karen's husband Dave
Who is Karen's oldest son Joshua
Who is Karen's middle son Jason
Who is Norma's oldest son? Jim
What is Jim's grandsons name? Harrison
What is Jim's daughter's name Megan
What is Josh's wifes name Chris
What is Josh's oldest son's name Jayden
Who is the baby of the family? Jeff
who is the youngest daughter Sherry
Who is Sherry married too? Scott
Who is Sherry's only grandchild Terren
Who is sherry's youngest son" Erik
Who is Sherry's only daughter? Caityn
Who is Jeff's oldest daughter Olivia
who is Jim's wife Linda
Who is Jim's son? Alex
Who is Karen's youngest? Jordan
who is Jeff's middle daughter? Abigail
Who is Jeff's youngest? Elise
Who is Joshua's youngest Jacob
Who is Josh's oldest? Jayden
Who is Harrison's mom? COurtenay
Who is Karens granddaughter? Brianna
Who is Jordan's oldest Kylah
Who is Jordan's youngest girl? Jazzlyn
who is jordan's middle girl? Jacklyn

Business Math Word Search

Type
Word Search
Description

deductions
withholdings
calculating
payroll
merchandise
receipts
ledger
petty cash
audit
expense
capital
transaction
balance sheet
proprietorship
asset
liability
journal
accounting

Cybersecurity Worksheet

Type
Matching Worksheet
Description

Something or someone that may result in harm to asset threat
Probability of a threat exploiting a vulnerability risk
A weakness that threatens the confidentiality, integrity, or availability (CIA) of an asset Vulnerability
Tool or technique that takes advantage of a vulnerability Exploit
Process of identifying, assessing, and reducing risk to an acceptable level Risk management
Security feature designed to restrict who has access to a network, IS, or data. Access control
The process of generating, recording, and reviewing a chronological record of system events to determine their accuracy Audit
Transforming data into scrambled code to protect it from being understood by unauthorized users Encryption
Readable text Plaintext
Encrypted text Ciphertext
Software or hardware device that controls access to a private network from a public network (Internet) by analyzing data packets entering or exiting it Firewall
The ability of an IS to continue to operate when a failure occurs, but usually for a limited time or at a reduced level Fault tolerance

Events Leading to the Civil War Word Search

Type
Word Search
Description

Slave Revolts
Sumner
South
Buchanan
Black Moses
Nat Turner
California
Abolitionists
Christiana Riot
Border Ruffians
Popular Sovereignty
Fort Sumter
Confederate States
South Carolina
Dred Scott
Bleeding Kansas
John Brown
Uncle Tom's Cabin
Lincoln
Secede
Fugitive Slave Act
Free Soil Party
Republicans
North
Wilmot Proviso

MLK Word Search

Type
Word Search
Description

Fairness
Nobel
African American
Justice
Liberty
January
Washington DC
Civil Rights
Peace
Skin
Protest
Equality
Freedom
Leadership
Atlanta
Racism
Speech
Dream
Coretta Scott King
Martin Luther King Jr.

Finance Word Search

Type
Word Search
Description

Rights
Lease
Sale
Profit
Partnership
Expenses
Leverage
Liability
Investor
Equality
Dividend
Loan
Default
Debit
Accounts
Annual Meeting
Asset
Audit
Bank
Banking
Budget
Business
Business Plan
Capital
Commerce
Coorporation
Credit Card
Credit History
Economics
Financial Affairs
Investment
Job
Manage
Money

Tax Day word search

Type
Word Search
Description

accountant
allocate
assets
audit
book value
budget
capital
cash
charitable contributions
cpa
credit
deductions
equity
federal
finance
government
investments
ira
irs
liabilities
money
mortgage interest
property tax
reciprocity
refund
reimbursement
state
tax day
taxes
uncle sam

Financial Terms Crossword

Type
Crossword
Description

This is the assets (or money) available to an organisation to re-invest and create new assets. It starts with C. Capital
An ______ is an independent examination of an organisation's records and financial statements (report and accounts). Audit
These are things which are owned by a business such as buildings, vehicles, stock and money in the bank. Assets
You make this if you sell or dispose of a long−term asset (such as a building) for more than it cost you. Two words ______ G____ Capital Gain
These are short−term assets which are constantly changing in value, such as stocks, debtors and bank balances (two words) Current Assets
This is the value of a company’s assets minus any liabilities. Basically, the value of something less the money owing on it. Equity
Any of the costs involved in running the business. Expenses
A __________ is one which is intended to be used for several years and not be converted into cash. Examples are buildings, machinery and vehicles (two words) Fixed Asset
This is the difference between the selling price of goods and what they cost to buy (two words). Gross Profit
These are debts that a person or an organisation owes. Liabilities
This is the profit left after all overheads have been taken off (two words). Net Profit
A detailed projection of all estimated income and expenses based on forecasted sales revenue for a year (two words) O_______ ________ Operating Budget
The amount of money that a company actually receives during a specific period, including discounts and deductions for returned merchandise. Revenue
Trainer's name Maree

Cyber Security Awareness Word Search

Type
Word Search
Description

CODE
SPOOFING
INTERNET
HTTPS
HONEYPOT
HASHING
FORENSICS
FTP
EXPLOIT
DECRYPTION
CRYPTOGRAPHY
CONTROL
CIPHER
CONTAINMENT
COMPLIANCE
BACKDOOR
BEHAVIOUR
BIOMETRICS
VECTOR
ADWARE
POLICY
HARVESTING
EMAIL
MONITOR
AUDIT
AUTHORIZATION
ASSET
CLOUD
KEYLOGGER
NETWORK
TROJAN
WORM
CONFIDENTIALITY
AVAILABILITY
INTEGRITY
WIFI
VULNERABILITY
USERNAME
THREAT
BOTNET
SPYWARE
RANSOMWARE
VIRUS
MALEWARE
CERTIFICATE
AUTHENTICATION
FIREWALL
ENCRYPTION
ATTACK
AWARENESS
PASSWORD
PRIVACY
SECURITY
BREACH
HACKER
PHISHING