cybersecurity threats
financial literacy
constitutional law
data analysis technique
project management mothol
100

This type of malware encrypts a victim’s files and demands a ransom for their release.

Ransomware

100

This calculation helps determine the potential profitability of an investment by considering its initial cost and expected returns.

Return on Investment (ROI)

100

This amendment protects against unreasonable searches and seizures.

Fourth Amendment

100

This statistical method is used to determine the strength and direction of the relationship between two variables.

Correlation

100

This iterative methodology emphasizes flexibility and collaboration throughout the project lifecycle.

Agile

200

This attack exploits vulnerabilities in software to gain unauthorized access to a system.

Software Exploit

200

This type of debt typically has a variable interest rate and requires minimum monthly payments.

Revolving Credit

200

This clause prevents the government from establishing a state religion.

Establishment Clause?

200

This process involves cleaning, transforming, and modeling data to discover useful information.

Data Mining

200

This document outlines the project’s scope, objectives, and deliverables

Project Charter

300

This social engineering tactic involves impersonating a legitimate entity to steal sensitive information.

Phishing

300

This financial statement provides a snapshot of a company’s assets, liabilities, and equity at a specific point in time.

Balance Sheet

300

This legal principle requires that individuals be treated fairly by the government.

Due Process

300

This type of chart is used to visualize the distribution of a single variable.

Histogram

300

This tool is used to visually represent the tasks, dependencies, and timelines of a project.

Gantt Chart

400

This type of attack floods a network with traffic, making it unavailable to legitimate users.

Denial-of-Service (DoS) attack

400

This strategy involves spreading investments across different asset classes to reduce risk.

Diversification

400

This amendment guarantees the right to a speedy and public trial.

Sixth Amendment

400

This technique involves using historical data to predict future outcomes.

Regression Analysis

400

This document outlines the project’s objectives, scope, deliverables, and stakeholders.

Project Charter

500

This type of attack exploits vulnerabilities in software before a patch is available.

Zero-day exploit

500

This type of debt is secured by collateral, such as a house or car.

Secured Debt

500

This clause in the U.S. Constitution grants Congress the power to regulate commerce among the states.

Commerce Clause

500

This technique is used to reduce the dimensionality of data while preserving its important features.

Principal Component Analysis (PCA)

500

This technique involves identifying and assessing potential risks to the project.

Risk Management

M
e
n
u