Register IP addressing Control Unit Heuristic Malware UDP CPU Asymmetric encryption Hashing Star topology Worm Segmentation Primary storage Program Counter Symmetric encryption Lossless compression Data redundancy Paging MDR LAN Truth table DHCP Biometric authentication Logic gate Serial transmission Von Neumann architecture Unicode WAN Normalisation Phishing Packet DNS Full- duplex Pipelining SQL injection ISR Client- server Disk thrashing Finite state machine Referential integrity Decomposition Primary key Harvard architecture Interrupt ALU Peer- to-peer Firewall ACID Trojan Field State transition diagram Virus Bus topology Record TCP/IP Free! Secondary storage Accumulator Algorithm CIR Virtual memory Parallel transmission Protocol Proxy server Simplex Cache memory Clock speed Boolean algebra Relationship Foreign key Metadata Authentication MAR Abstraction MAC address Encryption Firewall Lossy compression Entity Half- duplex ASCII Register IP addressing Control Unit Heuristic Malware UDP CPU Asymmetric encryption Hashing Star topology Worm Segmentation Primary storage Program Counter Symmetric encryption Lossless compression Data redundancy Paging MDR LAN Truth table DHCP Biometric authentication Logic gate Serial transmission Von Neumann architecture Unicode WAN Normalisation Phishing Packet DNS Full- duplex Pipelining SQL injection ISR Client- server Disk thrashing Finite state machine Referential integrity Decomposition Primary key Harvard architecture Interrupt ALU Peer- to-peer Firewall ACID Trojan Field State transition diagram Virus Bus topology Record TCP/IP Free! Secondary storage Accumulator Algorithm CIR Virtual memory Parallel transmission Protocol Proxy server Simplex Cache memory Clock speed Boolean algebra Relationship Foreign key Metadata Authentication MAR Abstraction MAC address Encryption Firewall Lossy compression Entity Half- duplex ASCII
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Register
IP addressing
Control Unit
Heuristic
Malware
UDP
CPU
Asymmetric encryption
Hashing
Star topology
Worm
Segmentation
Primary storage
Program Counter
Symmetric encryption
Lossless compression
Data redundancy
Paging
MDR
LAN
Truth table
DHCP
Biometric authentication
Logic gate
Serial transmission
Von Neumann architecture
Unicode
WAN
Normalisation
Phishing
Packet
DNS
Full-duplex
Pipelining
SQL injection
ISR
Client-server
Disk thrashing
Finite state machine
Referential integrity
Decomposition
Primary key
Harvard architecture
Interrupt
ALU
Peer-to-peer
Firewall
ACID
Trojan
Field
State transition diagram
Virus
Bus topology
Record
TCP/IP
Free!
Secondary storage
Accumulator
Algorithm
CIR
Virtual memory
Parallel transmission
Protocol
Proxy server
Simplex
Cache memory
Clock speed
Boolean algebra
Relationship
Foreign key
Metadata
Authentication
MAR
Abstraction
MAC address
Encryption
Firewall
Lossy compression
Entity
Half-duplex
ASCII