informationprivacywebfeedartificialintelligence(AI)socialengineeringportalencryptionutilitarianismriskmatrixneuralnetworksinglesign-onmarketbasketanalysispredictiveanalyticsstickinessphishingexpertsystembotnetsoptimizationdigital rightsmanagement(DRM)forecastingfirewallethicstextminingonlineanalyticalprocessing(OLAP)what-ifanalysisintellectualpropertykeyperformanceindicators(KPIs)distributeddenial ofservice(DDoS)mashupproxynaturallaws andrightspublic keyencryptionCAPTCHAmalwareinformationsecuritygoalseekingdashboardclickstreamdataintelligentagentsmultifactorauthenticationincidenceresponseplaninformationprivacywebfeedartificialintelligence(AI)socialengineeringportalencryptionutilitarianismriskmatrixneuralnetworksinglesign-onmarketbasketanalysispredictiveanalyticsstickinessphishingexpertsystembotnetsoptimizationdigital rightsmanagement(DRM)forecastingfirewallethicstextminingonlineanalyticalprocessing(OLAP)what-ifanalysisintellectualpropertykeyperformanceindicators(KPIs)distributeddenial ofservice(DDoS)mashupproxynaturallaws andrightspublic keyencryptionCAPTCHAmalwareinformationsecuritygoalseekingdashboardclickstreamdataintelligentagentsmultifactorauthenticationincidenceresponseplan

Chapter 7, 10 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. information privacy
  2. web feed
  3. artificial intelligence (AI)
  4. social engineering
  5. portal
  6. encryption
  7. utilitarianism
  8. risk matrix
  9. neural network
  10. single sign-on
  11. market basket analysis
  12. predictive analytics
  13. stickiness
  14. phishing
  15. expert system
  16. botnets
  17. optimization
  18. digital rights management (DRM)
  19. forecasting
  20. firewall
  21. ethics
  22. text mining
  23. online analytical processing (OLAP)
  24. what-if analysis
  25. intellectual property
  26. key performance indicators (KPIs)
  27. distributed denial of service (DDoS)
  28. mashup
  29. proxy
  30. natural laws and rights
  31. public key encryption
  32. CAPTCHA
  33. malware
  34. information security
  35. goal seeking
  36. dashboard
  37. clickstream data
  38. intelligent agents
  39. multifactor authentication
  40. incidence response plan