public keyencryptionproxybotnetsgroupdecisionsupportsystem(GDSS)virtualworldethicswikiutilitarianismincidenceresponseplanriskmatrixSMTPserverIMAP(Internetmail accessprotocol)sharedworkspacesinglesign-onfirewallhastagdigital rightsmanagement(DRM)naturallaws andrightsinformationsecuritymediarichnessphishingunifiedcommunications(UC)microbloggingmalwaresocialengineeringpresenceawarenessinstantmessaging(IM)encryptionmultifactorauthenticationdistributeddenial ofservice(DDoS)webconferencingbloginformationprivacytelepresencevirtualrealitymicroformatswarroomintellectualpropertypublic keyencryptionproxybotnetsgroupdecisionsupportsystem(GDSS)virtualworldethicswikiutilitarianismincidenceresponseplanriskmatrixSMTPserverIMAP(Internetmail accessprotocol)sharedworkspacesinglesign-onfirewallhastagdigital rightsmanagement(DRM)naturallaws andrightsinformationsecuritymediarichnessphishingunifiedcommunications(UC)microbloggingmalwaresocialengineeringpresenceawarenessinstantmessaging(IM)encryptionmultifactorauthenticationdistributeddenial ofservice(DDoS)webconferencingbloginformationprivacytelepresencevirtualrealitymicroformatswarroomintellectualproperty

chapter 10, 7 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
  1. public key encryption
  2. proxy
  3. botnets
  4. group decision support system (GDSS)
  5. virtual world
  6. ethics
  7. wiki
  8. utilitarianism
  9. incidence response plan
  10. risk matrix
  11. SMTP server
  12. IMAP (Internet mail access protocol)
  13. shared workspace
  14. single sign-on
  15. firewall
  16. hastag
  17. digital rights management (DRM)
  18. natural laws and rights
  19. information security
  20. media richness
  21. phishing
  22. unified communications (UC)
  23. microblogging
  24. malware
  25. social engineering
  26. presence awareness
  27. instant messaging (IM)
  28. encryption
  29. multifactor authentication
  30. distributed denial of service (DDoS)
  31. web conferencing
  32. blog
  33. information privacy
  34. telepresence
  35. virtual reality
  36. microformats
  37. war room
  38. intellectual property