MDR ACID Primary key Normalisation Program Counter Firewall UDP Primary storage Entity Simplex Logic gate ALU Segmentation State transition diagram Bus topology Lossy compression IP addressing Control Unit Star topology TCP/IP Hashing Cache memory ASCII Half- duplex LAN Virtual memory Accumulator Malware Data redundancy Parallel transmission Secondary storage Symmetric encryption Lossless compression WAN ISR Asymmetric encryption Interrupt Field Serial transmission Unicode Phishing CPU Pipelining Encryption Referential integrity SQL injection Finite state machine Abstraction Metadata Authentication MAR Trojan Firewall Algorithm Truth table Register Protocol Paging Clock speed Heuristic Peer- to-peer Worm Von Neumann architecture Free! Decomposition Full- duplex CIR Foreign key Harvard architecture Proxy server Biometric authentication DNS Client- server Virus Relationship MAC address Record Packet DHCP Boolean algebra Disk thrashing MDR ACID Primary key Normalisation Program Counter Firewall UDP Primary storage Entity Simplex Logic gate ALU Segmentation State transition diagram Bus topology Lossy compression IP addressing Control Unit Star topology TCP/IP Hashing Cache memory ASCII Half- duplex LAN Virtual memory Accumulator Malware Data redundancy Parallel transmission Secondary storage Symmetric encryption Lossless compression WAN ISR Asymmetric encryption Interrupt Field Serial transmission Unicode Phishing CPU Pipelining Encryption Referential integrity SQL injection Finite state machine Abstraction Metadata Authentication MAR Trojan Firewall Algorithm Truth table Register Protocol Paging Clock speed Heuristic Peer- to-peer Worm Von Neumann architecture Free! Decomposition Full- duplex CIR Foreign key Harvard architecture Proxy server Biometric authentication DNS Client- server Virus Relationship MAC address Record Packet DHCP Boolean algebra Disk thrashing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
MDR
ACID
Primary key
Normalisation
Program Counter
Firewall
UDP
Primary storage
Entity
Simplex
Logic gate
ALU
Segmentation
State transition diagram
Bus topology
Lossy compression
IP addressing
Control Unit
Star topology
TCP/IP
Hashing
Cache memory
ASCII
Half-duplex
LAN
Virtual memory
Accumulator
Malware
Data redundancy
Parallel transmission
Secondary storage
Symmetric encryption
Lossless compression
WAN
ISR
Asymmetric encryption
Interrupt
Field
Serial transmission
Unicode
Phishing
CPU
Pipelining
Encryption
Referential integrity
SQL injection
Finite state machine
Abstraction
Metadata
Authentication
MAR
Trojan
Firewall
Algorithm
Truth table
Register
Protocol
Paging
Clock speed
Heuristic
Peer-to-peer
Worm
Von Neumann architecture
Free!
Decomposition
Full-duplex
CIR
Foreign key
Harvard architecture
Proxy server
Biometric authentication
DNS
Client-server
Virus
Relationship
MAC address
Record
Packet
DHCP
Boolean algebra
Disk thrashing