socialengineeringmashupphishingmarketbasketanalysisdistributeddenial ofservice(DDoS)singlesign-onutilitarianismportalCAPTCHAforecastingpublic keyencryptionclickstreamdatainformationsecuritybotnetsincidenceresponseplanriskmatrixnaturallaws andrightswhat-ifanalysisintelligentagentsmalwaredigital rightsmanagement(DRM)informationprivacyartificialintelligence(AI)optimizationneuralnetworkintellectualpropertyonlineanalyticalprocessing(OLAP)proxytextminingmultifactorauthenticationencryptionkeyperformanceindicators(KPIs)expertsystemdashboardstickinesswebfeedfirewallpredictiveanalyticsethicsgoalseekingsocialengineeringmashupphishingmarketbasketanalysisdistributeddenial ofservice(DDoS)singlesign-onutilitarianismportalCAPTCHAforecastingpublic keyencryptionclickstreamdatainformationsecuritybotnetsincidenceresponseplanriskmatrixnaturallaws andrightswhat-ifanalysisintelligentagentsmalwaredigital rightsmanagement(DRM)informationprivacyartificialintelligence(AI)optimizationneuralnetworkintellectualpropertyonlineanalyticalprocessing(OLAP)proxytextminingmultifactorauthenticationencryptionkeyperformanceindicators(KPIs)expertsystemdashboardstickinesswebfeedfirewallpredictiveanalyticsethicsgoalseeking

Chapter 7, 10 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. social engineering
  2. mashup
  3. phishing
  4. market basket analysis
  5. distributed denial of service (DDoS)
  6. single sign-on
  7. utilitarianism
  8. portal
  9. CAPTCHA
  10. forecasting
  11. public key encryption
  12. clickstream data
  13. information security
  14. botnets
  15. incidence response plan
  16. risk matrix
  17. natural laws and rights
  18. what-if analysis
  19. intelligent agents
  20. malware
  21. digital rights management (DRM)
  22. information privacy
  23. artificial intelligence (AI)
  24. optimization
  25. neural network
  26. intellectual property
  27. online analytical processing (OLAP)
  28. proxy
  29. text mining
  30. multifactor authentication
  31. encryption
  32. key performance indicators (KPIs)
  33. expert system
  34. dashboard
  35. stickiness
  36. web feed
  37. firewall
  38. predictive analytics
  39. ethics
  40. goal seeking