onlineanalyticalprocessing(OLAP)goalseekingexpertsystemclickstreamdatawhat-ifanalysiswebfeedintelligentagentsphishingmalwarenaturallaws andrightstextminingdashboardincidenceresponseplanencryptionneuralnetworkstickinessCAPTCHAoptimizationmarketbasketanalysisriskmatrixethicssinglesign-onutilitarianismbotnetsmashuppublic keyencryptionsocialengineeringinformationsecuritymultifactorauthenticationdigital rightsmanagement(DRM)predictiveanalyticsforecastingproxyartificialintelligence(AI)portalkeyperformanceindicators(KPIs)informationprivacyfirewallintellectualpropertydistributeddenial ofservice(DDoS)onlineanalyticalprocessing(OLAP)goalseekingexpertsystemclickstreamdatawhat-ifanalysiswebfeedintelligentagentsphishingmalwarenaturallaws andrightstextminingdashboardincidenceresponseplanencryptionneuralnetworkstickinessCAPTCHAoptimizationmarketbasketanalysisriskmatrixethicssinglesign-onutilitarianismbotnetsmashuppublic keyencryptionsocialengineeringinformationsecuritymultifactorauthenticationdigital rightsmanagement(DRM)predictiveanalyticsforecastingproxyartificialintelligence(AI)portalkeyperformanceindicators(KPIs)informationprivacyfirewallintellectualpropertydistributeddenial ofservice(DDoS)

Chapter 7, 10 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. online analytical processing (OLAP)
  2. goal seeking
  3. expert system
  4. clickstream data
  5. what-if analysis
  6. web feed
  7. intelligent agents
  8. phishing
  9. malware
  10. natural laws and rights
  11. text mining
  12. dashboard
  13. incidence response plan
  14. encryption
  15. neural network
  16. stickiness
  17. CAPTCHA
  18. optimization
  19. market basket analysis
  20. risk matrix
  21. ethics
  22. single sign-on
  23. utilitarianism
  24. botnets
  25. mashup
  26. public key encryption
  27. social engineering
  28. information security
  29. multifactor authentication
  30. digital rights management (DRM)
  31. predictive analytics
  32. forecasting
  33. proxy
  34. artificial intelligence (AI)
  35. portal
  36. key performance indicators (KPIs)
  37. information privacy
  38. firewall
  39. intellectual property
  40. distributed denial of service (DDoS)