text mining information security distributed denial of service (DDoS) malware multifactor authentication public key encryption information privacy forecasting incidence response plan firewall social engineering web feed artificial intelligence (AI) expert system goal seeking intelligent agents neural network dashboard single sign-on what-if analysis risk matrix portal ethics intellectual property key performance indicators (KPIs) optimization phishing predictive analytics botnets stickiness utilitarianism market basket analysis online analytical processing (OLAP) CAPTCHA natural laws and rights mashup clickstream data digital rights management (DRM) encryption proxy text mining information security distributed denial of service (DDoS) malware multifactor authentication public key encryption information privacy forecasting incidence response plan firewall social engineering web feed artificial intelligence (AI) expert system goal seeking intelligent agents neural network dashboard single sign-on what-if analysis risk matrix portal ethics intellectual property key performance indicators (KPIs) optimization phishing predictive analytics botnets stickiness utilitarianism market basket analysis online analytical processing (OLAP) CAPTCHA natural laws and rights mashup clickstream data digital rights management (DRM) encryption proxy
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
text mining
information security
distributed denial of service (DDoS)
malware
multifactor authentication
public key encryption
information privacy
forecasting
incidence response plan
firewall
social engineering
web feed
artificial intelligence (AI)
expert system
goal seeking
intelligent agents
neural network
dashboard
single sign-on
what-if analysis
risk matrix
portal
ethics
intellectual property
key performance indicators (KPIs)
optimization
phishing
predictive analytics
botnets
stickiness
utilitarianism
market basket analysis
online analytical processing (OLAP)
CAPTCHA
natural laws and rights
mashup
clickstream data
digital rights management (DRM)
encryption
proxy