phishingtelepresencemicrobloggingvirtualrealitySMTPserverinformationsecurityIMAP(Internetmail accessprotocol)groupdecisionsupportsystem(GDSS)informationprivacyhastagwikiinstantmessaging(IM)warroomintellectualpropertyvirtualworldutilitarianismblogincidenceresponseplanencryptionnaturallaws andrightssharedworkspacesinglesign-onmediarichnessfirewallpresenceawarenesspublic keyencryptiondistributeddenial ofservice(DDoS)microformatswebconferencingdigital rightsmanagement(DRM)malwareethicssocialengineeringbotnetsproxymultifactorauthenticationriskmatrixunifiedcommunications(UC)phishingtelepresencemicrobloggingvirtualrealitySMTPserverinformationsecurityIMAP(Internetmail accessprotocol)groupdecisionsupportsystem(GDSS)informationprivacyhastagwikiinstantmessaging(IM)warroomintellectualpropertyvirtualworldutilitarianismblogincidenceresponseplanencryptionnaturallaws andrightssharedworkspacesinglesign-onmediarichnessfirewallpresenceawarenesspublic keyencryptiondistributeddenial ofservice(DDoS)microformatswebconferencingdigital rightsmanagement(DRM)malwareethicssocialengineeringbotnetsproxymultifactorauthenticationriskmatrixunifiedcommunications(UC)

chapter 10, 7 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
  1. phishing
  2. telepresence
  3. microblogging
  4. virtual reality
  5. SMTP server
  6. information security
  7. IMAP (Internet mail access protocol)
  8. group decision support system (GDSS)
  9. information privacy
  10. hastag
  11. wiki
  12. instant messaging (IM)
  13. war room
  14. intellectual property
  15. virtual world
  16. utilitarianism
  17. blog
  18. incidence response plan
  19. encryption
  20. natural laws and rights
  21. shared workspace
  22. single sign-on
  23. media richness
  24. firewall
  25. presence awareness
  26. public key encryption
  27. distributed denial of service (DDoS)
  28. microformats
  29. web conferencing
  30. digital rights management (DRM)
  31. malware
  32. ethics
  33. social engineering
  34. botnets
  35. proxy
  36. multifactor authentication
  37. risk matrix
  38. unified communications (UC)