informationprivacyforecastingriskmatrixphishingfirewallmalwareonlineanalyticalprocessing(OLAP)naturallaws andrightsutilitarianismethicsintellectualpropertyclickstreamdatawhat-ifanalysisCAPTCHAsinglesign-onexpertsystemdistributeddenial ofservice(DDoS)marketbasketanalysisneuralnetworktextminingproxystickinessgoalseekingsocialengineeringintelligentagentsmultifactorauthenticationdashboardartificialintelligence(AI)keyperformanceindicators(KPIs)encryptionbotnetspredictiveanalyticspublic keyencryptionmashupportaldigital rightsmanagement(DRM)incidenceresponseplanwebfeedinformationsecurityoptimizationinformationprivacyforecastingriskmatrixphishingfirewallmalwareonlineanalyticalprocessing(OLAP)naturallaws andrightsutilitarianismethicsintellectualpropertyclickstreamdatawhat-ifanalysisCAPTCHAsinglesign-onexpertsystemdistributeddenial ofservice(DDoS)marketbasketanalysisneuralnetworktextminingproxystickinessgoalseekingsocialengineeringintelligentagentsmultifactorauthenticationdashboardartificialintelligence(AI)keyperformanceindicators(KPIs)encryptionbotnetspredictiveanalyticspublic keyencryptionmashupportaldigital rightsmanagement(DRM)incidenceresponseplanwebfeedinformationsecurityoptimization

Chapter 7, 10 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. information privacy
  2. forecasting
  3. risk matrix
  4. phishing
  5. firewall
  6. malware
  7. online analytical processing (OLAP)
  8. natural laws and rights
  9. utilitarianism
  10. ethics
  11. intellectual property
  12. clickstream data
  13. what-if analysis
  14. CAPTCHA
  15. single sign-on
  16. expert system
  17. distributed denial of service (DDoS)
  18. market basket analysis
  19. neural network
  20. text mining
  21. proxy
  22. stickiness
  23. goal seeking
  24. social engineering
  25. intelligent agents
  26. multifactor authentication
  27. dashboard
  28. artificial intelligence (AI)
  29. key performance indicators (KPIs)
  30. encryption
  31. botnets
  32. predictive analytics
  33. public key encryption
  34. mashup
  35. portal
  36. digital rights management (DRM)
  37. incidence response plan
  38. web feed
  39. information security
  40. optimization