riskmatrixinstantmessaging(IM)public keyencryptionpresenceawarenessvirtualrealitytelepresenceinformationsecurityunifiedcommunications(UC)IMAP(Internetmail accessprotocol)botnetsutilitarianismmalwarevirtualworldwarroomwebconferencingsharedworkspacewikidistributeddenial ofservice(DDoS)microformatsmediarichnessethicsphishingproxymicrobloggingfirewalldigital rightsmanagement(DRM)multifactorauthenticationbloginformationprivacysinglesign-onincidenceresponseplanencryptiongroupdecisionsupportsystem(GDSS)naturallaws andrightsintellectualpropertyhastagSMTPserversocialengineeringriskmatrixinstantmessaging(IM)public keyencryptionpresenceawarenessvirtualrealitytelepresenceinformationsecurityunifiedcommunications(UC)IMAP(Internetmail accessprotocol)botnetsutilitarianismmalwarevirtualworldwarroomwebconferencingsharedworkspacewikidistributeddenial ofservice(DDoS)microformatsmediarichnessethicsphishingproxymicrobloggingfirewalldigital rightsmanagement(DRM)multifactorauthenticationbloginformationprivacysinglesign-onincidenceresponseplanencryptiongroupdecisionsupportsystem(GDSS)naturallaws andrightsintellectualpropertyhastagSMTPserversocialengineering

chapter 10, 7 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
  1. risk matrix
  2. instant messaging (IM)
  3. public key encryption
  4. presence awareness
  5. virtual reality
  6. telepresence
  7. information security
  8. unified communications (UC)
  9. IMAP (Internet mail access protocol)
  10. botnets
  11. utilitarianism
  12. malware
  13. virtual world
  14. war room
  15. web conferencing
  16. shared workspace
  17. wiki
  18. distributed denial of service (DDoS)
  19. microformats
  20. media richness
  21. ethics
  22. phishing
  23. proxy
  24. microblogging
  25. firewall
  26. digital rights management (DRM)
  27. multifactor authentication
  28. blog
  29. information privacy
  30. single sign-on
  31. incidence response plan
  32. encryption
  33. group decision support system (GDSS)
  34. natural laws and rights
  35. intellectual property
  36. hastag
  37. SMTP server
  38. social engineering