single sign-on microblogging microformats public key encryption natural laws and rights digital rights management (DRM) web conferencing virtual world botnets encryption multifactor authentication information security utilitarianism presence awareness SMTP server information privacy intellectual property hastag group decision support system (GDSS) wiki virtual reality unified communications (UC) war room risk matrix media richness incidence response plan proxy distributed denial of service (DDoS) social engineering phishing firewall malware shared workspace telepresence instant messaging (IM) blog ethics IMAP (Internet mail access protocol) single sign-on microblogging microformats public key encryption natural laws and rights digital rights management (DRM) web conferencing virtual world botnets encryption multifactor authentication information security utilitarianism presence awareness SMTP server information privacy intellectual property hastag group decision support system (GDSS) wiki virtual reality unified communications (UC) war room risk matrix media richness incidence response plan proxy distributed denial of service (DDoS) social engineering phishing firewall malware shared workspace telepresence instant messaging (IM) blog ethics IMAP (Internet mail access protocol)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
single sign-on
microblogging
microformats
public key encryption
natural laws and rights
digital rights management (DRM)
web conferencing
virtual world
botnets
encryption
multifactor authentication
information security
utilitarianism
presence awareness
SMTP server
information privacy
intellectual property
hastag
group decision support system (GDSS)
wiki
virtual reality
unified communications (UC)
war room
risk matrix
media richness
incidence response plan
proxy
distributed denial of service (DDoS)
social engineering
phishing
firewall
malware
shared workspace
telepresence
instant messaging (IM)
blog
ethics
IMAP (Internet mail access protocol)