public keyencryptionsocialengineeringunifiedcommunications(UC)virtualrealityinformationprivacymediarichnessmicroformatsdistributeddenial ofservice(DDoS)blogfirewallencryptionproxyinformationsecuritydigital rightsmanagement(DRM)phishingpresenceawarenessintellectualpropertyhastagutilitarianismmultifactorauthenticationIMAP(Internetmail accessprotocol)naturallaws andrightsgroupdecisionsupportsystem(GDSS)webconferencinginstantmessaging(IM)riskmatrixwikibotnetsincidenceresponseplansinglesign-onmalwareethicsSMTPserverwarroomvirtualworldtelepresencesharedworkspacemicrobloggingpublic keyencryptionsocialengineeringunifiedcommunications(UC)virtualrealityinformationprivacymediarichnessmicroformatsdistributeddenial ofservice(DDoS)blogfirewallencryptionproxyinformationsecuritydigital rightsmanagement(DRM)phishingpresenceawarenessintellectualpropertyhastagutilitarianismmultifactorauthenticationIMAP(Internetmail accessprotocol)naturallaws andrightsgroupdecisionsupportsystem(GDSS)webconferencinginstantmessaging(IM)riskmatrixwikibotnetsincidenceresponseplansinglesign-onmalwareethicsSMTPserverwarroomvirtualworldtelepresencesharedworkspacemicroblogging

chapter 10, 7 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
  1. public key encryption
  2. social engineering
  3. unified communications (UC)
  4. virtual reality
  5. information privacy
  6. media richness
  7. microformats
  8. distributed denial of service (DDoS)
  9. blog
  10. firewall
  11. encryption
  12. proxy
  13. information security
  14. digital rights management (DRM)
  15. phishing
  16. presence awareness
  17. intellectual property
  18. hastag
  19. utilitarianism
  20. multifactor authentication
  21. IMAP (Internet mail access protocol)
  22. natural laws and rights
  23. group decision support system (GDSS)
  24. web conferencing
  25. instant messaging (IM)
  26. risk matrix
  27. wiki
  28. botnets
  29. incidence response plan
  30. single sign-on
  31. malware
  32. ethics
  33. SMTP server
  34. war room
  35. virtual world
  36. telepresence
  37. shared workspace
  38. microblogging