wiki distributed denial of service (DDoS) risk matrix ethics digital rights management (DRM) web conferencing virtual reality utilitarianism shared workspace instant messaging (IM) microformats war room hastag group decision support system (GDSS) natural laws and rights information privacy malware presence awareness social engineering proxy telepresence intellectual property unified communications (UC) media richness incidence response plan information security phishing single sign-on microblogging IMAP (Internet mail access protocol) SMTP server firewall blog botnets public key encryption virtual world multifactor authentication encryption wiki distributed denial of service (DDoS) risk matrix ethics digital rights management (DRM) web conferencing virtual reality utilitarianism shared workspace instant messaging (IM) microformats war room hastag group decision support system (GDSS) natural laws and rights information privacy malware presence awareness social engineering proxy telepresence intellectual property unified communications (UC) media richness incidence response plan information security phishing single sign-on microblogging IMAP (Internet mail access protocol) SMTP server firewall blog botnets public key encryption virtual world multifactor authentication encryption
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
wiki
distributed denial of service (DDoS)
risk matrix
ethics
digital rights management (DRM)
web conferencing
virtual reality
utilitarianism
shared workspace
instant messaging (IM)
microformats
war room
hastag
group decision support system (GDSS)
natural laws and rights
information privacy
malware
presence awareness
social engineering
proxy
telepresence
intellectual property
unified communications (UC)
media richness
incidence response plan
information security
phishing
single sign-on
microblogging
IMAP (Internet mail access protocol)
SMTP server
firewall
blog
botnets
public key encryption
virtual world
multifactor authentication
encryption