wikidistributeddenial ofservice(DDoS)riskmatrixethicsdigital rightsmanagement(DRM)webconferencingvirtualrealityutilitarianismsharedworkspaceinstantmessaging(IM)microformatswarroomhastaggroupdecisionsupportsystem(GDSS)naturallaws andrightsinformationprivacymalwarepresenceawarenesssocialengineeringproxytelepresenceintellectualpropertyunifiedcommunications(UC)mediarichnessincidenceresponseplaninformationsecurityphishingsinglesign-onmicrobloggingIMAP(Internetmail accessprotocol)SMTPserverfirewallblogbotnetspublic keyencryptionvirtualworldmultifactorauthenticationencryptionwikidistributeddenial ofservice(DDoS)riskmatrixethicsdigital rightsmanagement(DRM)webconferencingvirtualrealityutilitarianismsharedworkspaceinstantmessaging(IM)microformatswarroomhastaggroupdecisionsupportsystem(GDSS)naturallaws andrightsinformationprivacymalwarepresenceawarenesssocialengineeringproxytelepresenceintellectualpropertyunifiedcommunications(UC)mediarichnessincidenceresponseplaninformationsecurityphishingsinglesign-onmicrobloggingIMAP(Internetmail accessprotocol)SMTPserverfirewallblogbotnetspublic keyencryptionvirtualworldmultifactorauthenticationencryption

chapter 10, 7 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
  1. wiki
  2. distributed denial of service (DDoS)
  3. risk matrix
  4. ethics
  5. digital rights management (DRM)
  6. web conferencing
  7. virtual reality
  8. utilitarianism
  9. shared workspace
  10. instant messaging (IM)
  11. microformats
  12. war room
  13. hastag
  14. group decision support system (GDSS)
  15. natural laws and rights
  16. information privacy
  17. malware
  18. presence awareness
  19. social engineering
  20. proxy
  21. telepresence
  22. intellectual property
  23. unified communications (UC)
  24. media richness
  25. incidence response plan
  26. information security
  27. phishing
  28. single sign-on
  29. microblogging
  30. IMAP (Internet mail access protocol)
  31. SMTP server
  32. firewall
  33. blog
  34. botnets
  35. public key encryption
  36. virtual world
  37. multifactor authentication
  38. encryption