Subjectshowing only Business Show all Subject
Results 1 - 7 of 7 matches
The Fund Identification Challenge part of Examples
Accounting Basics - Cribbingo part of Examples
Help students grasp accounting basics, the language of business, by playing Cribbingo.
Computer Fraud Word Search part of Examples
Identification of computer frauds as a computer attack, social engineering, or malware.
Processing Integrity Challenge part of Examples
The Processing Integrity Challenge makes use of game theory to help students learn how to determine relevant application controls for accounting systems to ensure processing integrity is achieved. It specifically addresses source data, data entry, processing, and output controls. The playing format is an adaptation of the television game show, Jeopardy, which is a novel way to reinforce concepts and provide immediate feedback to confirm students' knowledge.
Computer Fraud Challenge part of Examples
The Computer Fraud Challenge is based on the television show Hollywood Squares. The activity illustrates a variety of hacking and social engineering techniques that compromise confidential information, as well as malware that harms computers.
Transaction Analysis Tic-Tac-Toe part of Examples
Drill and practice transaction analysis by playing tic-tac-toe.
The AIS Transaction Cycles Game part of Examples
The AIS Transaction Cycles Game is designed to provide drill and practice or review of the elements that comprise the Revenue, Expenditure, Production, Human Resources, and Financing/Investing cycles. The game is a PowerPoint version of Connect 4.