botnetsforecastingmultifactorauthenticationproxywhat-ifanalysisclickstreamdatasocialengineeringpredictiveanalyticswebfeedneuralnetworkinformationprivacyethicsartificialintelligence(AI)malwareincidenceresponseplanpublic keyencryptionmashupdistributeddenial ofservice(DDoS)intelligentagentsgoalseekingnaturallaws andrightskeyperformanceindicators(KPIs)optimizationtextminingriskmatrixstickinessintellectualpropertyonlineanalyticalprocessing(OLAP)informationsecurityencryptionphishingexpertsystemdashboardCAPTCHAportaldigital rightsmanagement(DRM)firewallsinglesign-onmarketbasketanalysisutilitarianismbotnetsforecastingmultifactorauthenticationproxywhat-ifanalysisclickstreamdatasocialengineeringpredictiveanalyticswebfeedneuralnetworkinformationprivacyethicsartificialintelligence(AI)malwareincidenceresponseplanpublic keyencryptionmashupdistributeddenial ofservice(DDoS)intelligentagentsgoalseekingnaturallaws andrightskeyperformanceindicators(KPIs)optimizationtextminingriskmatrixstickinessintellectualpropertyonlineanalyticalprocessing(OLAP)informationsecurityencryptionphishingexpertsystemdashboardCAPTCHAportaldigital rightsmanagement(DRM)firewallsinglesign-onmarketbasketanalysisutilitarianism

Chapter 7, 10 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. botnets
  2. forecasting
  3. multifactor authentication
  4. proxy
  5. what-if analysis
  6. clickstream data
  7. social engineering
  8. predictive analytics
  9. web feed
  10. neural network
  11. information privacy
  12. ethics
  13. artificial intelligence (AI)
  14. malware
  15. incidence response plan
  16. public key encryption
  17. mashup
  18. distributed denial of service (DDoS)
  19. intelligent agents
  20. goal seeking
  21. natural laws and rights
  22. key performance indicators (KPIs)
  23. optimization
  24. text mining
  25. risk matrix
  26. stickiness
  27. intellectual property
  28. online analytical processing (OLAP)
  29. information security
  30. encryption
  31. phishing
  32. expert system
  33. dashboard
  34. CAPTCHA
  35. portal
  36. digital rights management (DRM)
  37. firewall
  38. single sign-on
  39. market basket analysis
  40. utilitarianism