Disk thrashing Primary key Relationship Virtual memory Segmentation Free! Worm Hashing Data redundancy Primary storage Unicode Malware Register Referential integrity DHCP Boolean algebra TCP/IP Truth table Foreign key Firewall Metadata Peer- to-peer ALU ISR State transition diagram Firewall MDR Pipelining Protocol Interrupt Logic gate MAR Authentication Heuristic Proxy server Entity Abstraction Cache memory Lossless compression Parallel transmission Record Simplex Finite state machine Decomposition IP addressing Star topology ACID Trojan Field WAN Accumulator Control Unit Program Counter LAN Virus Normalisation Encryption CPU Algorithm SQL injection Biometric authentication Half- duplex Asymmetric encryption ASCII CIR Clock speed Paging UDP Harvard architecture Secondary storage Serial transmission MAC address DNS Lossy compression Von Neumann architecture Full- duplex Symmetric encryption Packet Bus topology Client- server Phishing Disk thrashing Primary key Relationship Virtual memory Segmentation Free! Worm Hashing Data redundancy Primary storage Unicode Malware Register Referential integrity DHCP Boolean algebra TCP/IP Truth table Foreign key Firewall Metadata Peer- to-peer ALU ISR State transition diagram Firewall MDR Pipelining Protocol Interrupt Logic gate MAR Authentication Heuristic Proxy server Entity Abstraction Cache memory Lossless compression Parallel transmission Record Simplex Finite state machine Decomposition IP addressing Star topology ACID Trojan Field WAN Accumulator Control Unit Program Counter LAN Virus Normalisation Encryption CPU Algorithm SQL injection Biometric authentication Half- duplex Asymmetric encryption ASCII CIR Clock speed Paging UDP Harvard architecture Secondary storage Serial transmission MAC address DNS Lossy compression Von Neumann architecture Full- duplex Symmetric encryption Packet Bus topology Client- server Phishing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Disk thrashing
Primary key
Relationship
Virtual memory
Segmentation
Free!
Worm
Hashing
Data redundancy
Primary storage
Unicode
Malware
Register
Referential integrity
DHCP
Boolean algebra
TCP/IP
Truth table
Foreign key
Firewall
Metadata
Peer-to-peer
ALU
ISR
State transition diagram
Firewall
MDR
Pipelining
Protocol
Interrupt
Logic gate
MAR
Authentication
Heuristic
Proxy server
Entity
Abstraction
Cache memory
Lossless compression
Parallel transmission
Record
Simplex
Finite state machine
Decomposition
IP addressing
Star topology
ACID
Trojan
Field
WAN
Accumulator
Control Unit
Program Counter
LAN
Virus
Normalisation
Encryption
CPU
Algorithm
SQL injection
Biometric authentication
Half-duplex
Asymmetric encryption
ASCII
CIR
Clock speed
Paging
UDP
Harvard architecture
Secondary storage
Serial transmission
MAC address
DNS
Lossy compression
Von Neumann architecture
Full-duplex
Symmetric encryption
Packet
Bus topology
Client-server
Phishing