informationprivacyencryptionpublic keyencryptionmalwareutilitarianismhastagdigital rightsmanagement(DRM)firewallinformationsecuritytelepresenceethicsproxymicroformatssocialengineeringmicrobloggingriskmatrixnaturallaws andrightsdistributeddenial ofservice(DDoS)wikiwebconferencingbotnetssharedworkspaceunifiedcommunications(UC)groupdecisionsupportsystem(GDSS)virtualrealitypresenceawarenesswarroomintellectualpropertyphishingSMTPserversinglesign-onvirtualworldinstantmessaging(IM)mediarichnessblogmultifactorauthenticationincidenceresponseplanIMAP(Internetmail accessprotocol)informationprivacyencryptionpublic keyencryptionmalwareutilitarianismhastagdigital rightsmanagement(DRM)firewallinformationsecuritytelepresenceethicsproxymicroformatssocialengineeringmicrobloggingriskmatrixnaturallaws andrightsdistributeddenial ofservice(DDoS)wikiwebconferencingbotnetssharedworkspaceunifiedcommunications(UC)groupdecisionsupportsystem(GDSS)virtualrealitypresenceawarenesswarroomintellectualpropertyphishingSMTPserversinglesign-onvirtualworldinstantmessaging(IM)mediarichnessblogmultifactorauthenticationincidenceresponseplanIMAP(Internetmail accessprotocol)

chapter 10, 7 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
  1. information privacy
  2. encryption
  3. public key encryption
  4. malware
  5. utilitarianism
  6. hastag
  7. digital rights management (DRM)
  8. firewall
  9. information security
  10. telepresence
  11. ethics
  12. proxy
  13. microformats
  14. social engineering
  15. microblogging
  16. risk matrix
  17. natural laws and rights
  18. distributed denial of service (DDoS)
  19. wiki
  20. web conferencing
  21. botnets
  22. shared workspace
  23. unified communications (UC)
  24. group decision support system (GDSS)
  25. virtual reality
  26. presence awareness
  27. war room
  28. intellectual property
  29. phishing
  30. SMTP server
  31. single sign-on
  32. virtual world
  33. instant messaging (IM)
  34. media richness
  35. blog
  36. multifactor authentication
  37. incidence response plan
  38. IMAP (Internet mail access protocol)