singlesign-onmicrobloggingmicroformatspublic keyencryptionnaturallaws andrightsdigital rightsmanagement(DRM)webconferencingvirtualworldbotnetsencryptionmultifactorauthenticationinformationsecurityutilitarianismpresenceawarenessSMTPserverinformationprivacyintellectualpropertyhastaggroupdecisionsupportsystem(GDSS)wikivirtualrealityunifiedcommunications(UC)warroomriskmatrixmediarichnessincidenceresponseplanproxydistributeddenial ofservice(DDoS)socialengineeringphishingfirewallmalwaresharedworkspacetelepresenceinstantmessaging(IM)blogethicsIMAP(Internetmail accessprotocol)singlesign-onmicrobloggingmicroformatspublic keyencryptionnaturallaws andrightsdigital rightsmanagement(DRM)webconferencingvirtualworldbotnetsencryptionmultifactorauthenticationinformationsecurityutilitarianismpresenceawarenessSMTPserverinformationprivacyintellectualpropertyhastaggroupdecisionsupportsystem(GDSS)wikivirtualrealityunifiedcommunications(UC)warroomriskmatrixmediarichnessincidenceresponseplanproxydistributeddenial ofservice(DDoS)socialengineeringphishingfirewallmalwaresharedworkspacetelepresenceinstantmessaging(IM)blogethicsIMAP(Internetmail accessprotocol)

chapter 10, 7 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
  1. single sign-on
  2. microblogging
  3. microformats
  4. public key encryption
  5. natural laws and rights
  6. digital rights management (DRM)
  7. web conferencing
  8. virtual world
  9. botnets
  10. encryption
  11. multifactor authentication
  12. information security
  13. utilitarianism
  14. presence awareness
  15. SMTP server
  16. information privacy
  17. intellectual property
  18. hastag
  19. group decision support system (GDSS)
  20. wiki
  21. virtual reality
  22. unified communications (UC)
  23. war room
  24. risk matrix
  25. media richness
  26. incidence response plan
  27. proxy
  28. distributed denial of service (DDoS)
  29. social engineering
  30. phishing
  31. firewall
  32. malware
  33. shared workspace
  34. telepresence
  35. instant messaging (IM)
  36. blog
  37. ethics
  38. IMAP (Internet mail access protocol)