online analytical processing (OLAP) goal seeking expert system clickstream data what-if analysis web feed intelligent agents phishing malware natural laws and rights text mining dashboard incidence response plan encryption neural network stickiness CAPTCHA optimization market basket analysis risk matrix ethics single sign-on utilitarianism botnets mashup public key encryption social engineering information security multifactor authentication digital rights management (DRM) predictive analytics forecasting proxy artificial intelligence (AI) portal key performance indicators (KPIs) information privacy firewall intellectual property distributed denial of service (DDoS) online analytical processing (OLAP) goal seeking expert system clickstream data what-if analysis web feed intelligent agents phishing malware natural laws and rights text mining dashboard incidence response plan encryption neural network stickiness CAPTCHA optimization market basket analysis risk matrix ethics single sign-on utilitarianism botnets mashup public key encryption social engineering information security multifactor authentication digital rights management (DRM) predictive analytics forecasting proxy artificial intelligence (AI) portal key performance indicators (KPIs) information privacy firewall intellectual property distributed denial of service (DDoS)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
online analytical processing (OLAP)
goal seeking
expert system
clickstream data
what-if analysis
web feed
intelligent agents
phishing
malware
natural laws and rights
text mining
dashboard
incidence response plan
encryption
neural network
stickiness
CAPTCHA
optimization
market basket analysis
risk matrix
ethics
single sign-on
utilitarianism
botnets
mashup
public key encryption
social engineering
information security
multifactor authentication
digital rights management (DRM)
predictive analytics
forecasting
proxy
artificial intelligence (AI)
portal
key performance indicators (KPIs)
information privacy
firewall
intellectual property
distributed denial of service (DDoS)