stickinessoptimizationCAPTCHAincidenceresponseplaninformationprivacytextminingsinglesign-onkeyperformanceindicators(KPIs)firewallmashupwhat-ifanalysisinformationsecurityartificialintelligence(AI)expertsystemphishingportalencryptionforecastingneuralnetworkdistributeddenial ofservice(DDoS)marketbasketanalysisonlineanalyticalprocessing(OLAP)clickstreamdatariskmatrixnaturallaws andrightsmalwaredigital rightsmanagement(DRM)goalseekingpublic keyencryptionmultifactorauthenticationintelligentagentsintellectualpropertywebfeedpredictiveanalyticsproxybotnetsutilitarianismdashboardethicssocialengineeringstickinessoptimizationCAPTCHAincidenceresponseplaninformationprivacytextminingsinglesign-onkeyperformanceindicators(KPIs)firewallmashupwhat-ifanalysisinformationsecurityartificialintelligence(AI)expertsystemphishingportalencryptionforecastingneuralnetworkdistributeddenial ofservice(DDoS)marketbasketanalysisonlineanalyticalprocessing(OLAP)clickstreamdatariskmatrixnaturallaws andrightsmalwaredigital rightsmanagement(DRM)goalseekingpublic keyencryptionmultifactorauthenticationintelligentagentsintellectualpropertywebfeedpredictiveanalyticsproxybotnetsutilitarianismdashboardethicssocialengineering

Chapter 7, 10 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. stickiness
  2. optimization
  3. CAPTCHA
  4. incidence response plan
  5. information privacy
  6. text mining
  7. single sign-on
  8. key performance indicators (KPIs)
  9. firewall
  10. mashup
  11. what-if analysis
  12. information security
  13. artificial intelligence (AI)
  14. expert system
  15. phishing
  16. portal
  17. encryption
  18. forecasting
  19. neural network
  20. distributed denial of service (DDoS)
  21. market basket analysis
  22. online analytical processing (OLAP)
  23. clickstream data
  24. risk matrix
  25. natural laws and rights
  26. malware
  27. digital rights management (DRM)
  28. goal seeking
  29. public key encryption
  30. multifactor authentication
  31. intelligent agents
  32. intellectual property
  33. web feed
  34. predictive analytics
  35. proxy
  36. botnets
  37. utilitarianism
  38. dashboard
  39. ethics
  40. social engineering