Production Call: Oct. 9, 2020 Bingo Cards
Type
Bingo Cards
Description

Sorry, I was on mute!
Steve Miller’s ball cap
Dog Barking
Pet in the background
Division Business Plan
Self Performance Review
Microsoft Dynamic
POWER Business intelligence
Diversity & Inclusion
Completed 2-month projections
Team Building Event
Staff Performance Review
CEO Report
Phishing Training completed
Joined the Mentor Program
Updated Deltek opportunity
POWERing On
ARS Form in Outlook
Reported a Near Miss
Reported a Phishing scam
Safety Tip
Attended a virtual conference
Presented virtually
Visited a client site
Can you hear me?

    Customize    

EMAIL Word Search

EMAIL Word Search
Type
Word Search
Description

blind carbon copy
attachments
carbon copy
signature
etiquette
junk mail
reply all
all caps
contacts
phishing
caution
subject
compose
address
flaming
forward
groups
virus
reply
send
spam
scam
link
worm

C++ CrossWord

C++ CrossWord
Type
Crossword
Description

The keyword used to resolve the conflicts caused by multiple inheritance in c++.
one of the storage classes in c++.
Acts as an alias to another variable.
Dynamic array in Standard Template Library.
Keeps track of memory used for dynamic memory allocation.
float f=3; Declaration of this type causes the compiler to perform this operation before storing value into the variable.
Function that serves as a template for creating similar other functions.
A Function that has no body at all.
The capability of the function to resolve to the most derived version of the function with same signature.
keyword used to provide special access to inherited members.

Fraud Watch Network Word Search

Fraud Watch Network Word Search
Type
Word Search
Description

Social Security
Cyber Security
identity theft
Credit Report
Intimidation
Credibility
Anti-virus
Con Artist
Safeguard
Firewalls
Profiling
Scarcity
Watchdog
Phishing
Imposter
Hackers
Crime
scams
Fraud
AARP

IT&S Cyber Security Crossword Puzzle

IT&S Cyber Security Crossword Puzzle
Type
Crossword
Description

A software that is designed and destroy computer viruses
Do not leave your laptop or computer ___________________
A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit
Email scam or attempt to trick you into giving your password or personal information
The state of being free from danger and threat
A ___________ is often an email that gets mailed in chain letter fashion describing some devasting. highly unlikely type of virus.
Choose a password that is easy for you _______________ but hard for you someone to guess.
Also known as malicious software any; any program or file that is harmful to a computer user
Passwords should should always be at least this many characters long.
A _______ assessment is the process by which risks are identified and the impact of those risks determined
Applied to data to protect it from unauthorized use in case of theft or loss.
Always _______your computer when you leave your desk
To protect personal information, avoid sending it via
_________________ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user
A collection of information that is organized so that it can easily be accessed, managed and updated
Never share your _________ with another person

HR TERMINOLOGY Crossword

HR TERMINOLOGY Crossword
Type
Crossword
Description

The process of taking control over another corporation by purchasing
Acknowledgement of employees performance or achievements
The act of enlisting people for job
the act of dismissing an employee
an unauthorized and illegal strike that occurs during the term of an existing contract
The knowledge, skills and abilities required to perform a specific task or function
The approach to managing people and their performance
A complaint brought by one party to an employment contract against another party.
The process of introducing a new employee into the organization
The favoring of one group of people to the detriment of others.
A one-to-one process between an outside trainer and an employee
The process of discussion with a view to mutual settlement
The business practice of hiring a party outside a company
Disciplinary action resulting in an employee being sent home without pay for a specified period of time

Chapter 8-9 Vocab Crossword Puzzle

Chapter 8-9 Vocab Crossword Puzzle
Type
Crossword
Description

A complete record of your borrowing and repayment performance
A written statement of a consumer's credit history
In class, we studied the 5 C's of ...
a point system used to describe how creditworthy you are
You Credit Score is also known as your __________ score
The Four letter grades you can receive on a credit rating
The Equal Credit Opportunity Act prevents bias and _______________ against different groups of people
A terrible habit that occurs when you buy without thinking is called __________ buying
A court order that allows creditors to collect debts
an online scam, illegal, users are known as phishers
The formula for calculating interest is I = _ _ _
Credit card companies often have a period to pay off a balance without charging interest known as a _____________

INFO Security Crossword

INFO Security Crossword
Type
Crossword
Description

a software update designed to fix a particular problem or vulnerability <5 char>
the 's' in ______ stands for 'secure' and indicates that communication with a webpage is encrypted <5 char>
The activity of copying files or databases so that they will be preserved in case of equipment failure or other catastrophe <6 char>
any data classified as personal, private or sensitive information <4 char>
function of one way encryption that is normally used to check integrity of data <4 char>
hardware or software mechanisms to prevent unauthorized users from accessing a computer network <8 char>
malicious software that is inserted into a system, usually covertly, with the intent of compromising the victim's data <7 char>
a piece of digital information generated by a web server and saved in your computer after visiting a website <6 char>
a weakness of a system or facility holding information which can be exploited to gain access or violate system integrity <13 char>
an internet scam that targets unsuspecting users through email <8 char>
a type of malware designed to block access to a computer system or data until a sum of money is paid <10 char>
this horse can stampede your security defenses for the bad guys and make you look sheepish too <6 char>
your password is like a ____, use it regularly, change it often and do not share it with anyone else <10 char>
a ________ is a program and/or device that monitors data travelling over a network. These programs/devices can be used both for legitimate network management and for stealing information off a network <6 char>
____ is the scrambling of data into a secret code that can be read only by software set to decode that information <10 char>
spoofing, tampering etc are examples of a security _____ <6 char>
a way of injecting malicious scripts into web pages <18 char>
a ransomware crypto worm that attacked running microsoft windows operating systems, in May 2017 <8 char>
this malware targets microsoft windows based system and prevents it from booting <5 char>
group of experts that handle computer security incidents

Digital Citizenship Terms Word Search

Digital Citizenship Terms Word Search
Type
Word Search
Description

digital citizenship
digital footprint
identity theft
communication
cyberbullying
social media
vulnerable
plagiarism
persistent
deceiving
anonymous
harassing
software
hardware
firewall
identity
citation
phishing
internet
defaming
website
malware
flaming
google
scheme
scam
bias

Security Awareness Word Scramble

Security Awareness Word Scramble
Type
Word Scramble
Description

secret
responsibility
protect
confidential
top secret
email
encryption
firewall
malware
backup
virus
surf
theft
piracy
internet
policies
violations
phishing
need to know
attacks
facility security officer
homeland security
department of defense
police department
FBI
copyright
background checks
privacy
phone fraud
safety
log out
login
fraud
hoax
chain letters
network
security
spam
hackers
report
cybersecurity
threat
monitor
access
badges
serve
secure
tailgate
insider threat
accounts
scams
crime
passwords
breach
keylogger
spoofing
ransomware
intrusion detection
multifactor authentication
personal protective equipment
certified
trained
speak up
look out

Production Call: Oct. 9, 2020 Bingo Cards

Production Call: Oct. 9, 2020 Bingo Cards
Type
Bingo Cards
Description

Diversity & Inclusion
Completed 2-month projections
Team Building Event
Staff Performance Review
CEO Report
Self Performance Review
Microsoft Dynamic
POWER Business intelligence
Phishing Training completed
Joined the Mentor Program
Updated Deltek opportunity
POWERing On
ARS Form in Outlook
Visited a client site
Can you hear me?
Sorry, I was on mute!
Steve Miller’s ball cap
Dog Barking
Pet in the background
Division Business Plan
Reported a Near Miss
Reported a Phishing scam
Safety Tip
Attended a virtual conference
Presented virtually

    Customize