Referential integrity Phishing Firewall Peer- to-peer Metadata Record Data redundancy IP addressing Symmetric encryption Clock speed Interrupt DHCP Protocol Paging Bus topology Decomposition Simplex Serial transmission Logic gate Lossless compression Foreign key Harvard architecture Normalisation Authentication Segmentation DNS Free! Field Asymmetric encryption Primary storage WAN Von Neumann architecture Encryption Disk thrashing Star topology Unicode Packet Cache memory SQL injection MAC address ALU Program Counter CIR Relationship Virus Proxy server Primary key Pipelining Hashing Firewall Control Unit UDP TCP/IP Parallel transmission Biometric authentication Full- duplex Algorithm Accumulator Trojan CPU Entity ACID ASCII Half- duplex LAN Finite state machine Boolean algebra Worm Client- server Register State transition diagram Abstraction ISR Lossy compression Truth table MAR MDR Malware Heuristic Secondary storage Virtual memory Referential integrity Phishing Firewall Peer- to-peer Metadata Record Data redundancy IP addressing Symmetric encryption Clock speed Interrupt DHCP Protocol Paging Bus topology Decomposition Simplex Serial transmission Logic gate Lossless compression Foreign key Harvard architecture Normalisation Authentication Segmentation DNS Free! Field Asymmetric encryption Primary storage WAN Von Neumann architecture Encryption Disk thrashing Star topology Unicode Packet Cache memory SQL injection MAC address ALU Program Counter CIR Relationship Virus Proxy server Primary key Pipelining Hashing Firewall Control Unit UDP TCP/IP Parallel transmission Biometric authentication Full- duplex Algorithm Accumulator Trojan CPU Entity ACID ASCII Half- duplex LAN Finite state machine Boolean algebra Worm Client- server Register State transition diagram Abstraction ISR Lossy compression Truth table MAR MDR Malware Heuristic Secondary storage Virtual memory
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Referential integrity
Phishing
Firewall
Peer-to-peer
Metadata
Record
Data redundancy
IP addressing
Symmetric encryption
Clock speed
Interrupt
DHCP
Protocol
Paging
Bus topology
Decomposition
Simplex
Serial transmission
Logic gate
Lossless compression
Foreign key
Harvard architecture
Normalisation
Authentication
Segmentation
DNS
Free!
Field
Asymmetric encryption
Primary storage
WAN
Von Neumann architecture
Encryption
Disk thrashing
Star topology
Unicode
Packet
Cache memory
SQL injection
MAC address
ALU
Program Counter
CIR
Relationship
Virus
Proxy server
Primary key
Pipelining
Hashing
Firewall
Control Unit
UDP
TCP/IP
Parallel transmission
Biometric authentication
Full-duplex
Algorithm
Accumulator
Trojan
CPU
Entity
ACID
ASCII
Half-duplex
LAN
Finite state machine
Boolean algebra
Worm
Client-server
Register
State transition diagram
Abstraction
ISR
Lossy compression
Truth table
MAR
MDR
Malware
Heuristic
Secondary storage
Virtual memory