informationprivacyforecastingkeyperformanceindicators(KPIs)expertsystemmarketbasketanalysisintellectualpropertyphishingportalpublic keyencryptionintelligentagentsdigital rightsmanagement(DRM)neuralnetworktextminingnaturallaws andrightsfirewallgoalseekingwhat-ifanalysisstickinessdistributeddenial ofservice(DDoS)riskmatrixutilitarianismpredictiveanalyticssocialengineeringbotnetsmalwareencryptionartificialintelligence(AI)onlineanalyticalprocessing(OLAP)incidenceresponseplanethicsCAPTCHAinformationsecuritymashupwebfeedsinglesign-onmultifactorauthenticationoptimizationdashboardclickstreamdataproxyinformationprivacyforecastingkeyperformanceindicators(KPIs)expertsystemmarketbasketanalysisintellectualpropertyphishingportalpublic keyencryptionintelligentagentsdigital rightsmanagement(DRM)neuralnetworktextminingnaturallaws andrightsfirewallgoalseekingwhat-ifanalysisstickinessdistributeddenial ofservice(DDoS)riskmatrixutilitarianismpredictiveanalyticssocialengineeringbotnetsmalwareencryptionartificialintelligence(AI)onlineanalyticalprocessing(OLAP)incidenceresponseplanethicsCAPTCHAinformationsecuritymashupwebfeedsinglesign-onmultifactorauthenticationoptimizationdashboardclickstreamdataproxy

Chapter 7, 10 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. information privacy
  2. forecasting
  3. key performance indicators (KPIs)
  4. expert system
  5. market basket analysis
  6. intellectual property
  7. phishing
  8. portal
  9. public key encryption
  10. intelligent agents
  11. digital rights management (DRM)
  12. neural network
  13. text mining
  14. natural laws and rights
  15. firewall
  16. goal seeking
  17. what-if analysis
  18. stickiness
  19. distributed denial of service (DDoS)
  20. risk matrix
  21. utilitarianism
  22. predictive analytics
  23. social engineering
  24. botnets
  25. malware
  26. encryption
  27. artificial intelligence (AI)
  28. online analytical processing (OLAP)
  29. incidence response plan
  30. ethics
  31. CAPTCHA
  32. information security
  33. mashup
  34. web feed
  35. single sign-on
  36. multifactor authentication
  37. optimization
  38. dashboard
  39. clickstream data
  40. proxy