textmininginformationsecuritydistributeddenial ofservice(DDoS)malwaremultifactorauthenticationpublic keyencryptioninformationprivacyforecastingincidenceresponseplanfirewallsocialengineeringwebfeedartificialintelligence(AI)expertsystemgoalseekingintelligentagentsneuralnetworkdashboardsinglesign-onwhat-ifanalysisriskmatrixportalethicsintellectualpropertykeyperformanceindicators(KPIs)optimizationphishingpredictiveanalyticsbotnetsstickinessutilitarianismmarketbasketanalysisonlineanalyticalprocessing(OLAP)CAPTCHAnaturallaws andrightsmashupclickstreamdatadigital rightsmanagement(DRM)encryptionproxytextmininginformationsecuritydistributeddenial ofservice(DDoS)malwaremultifactorauthenticationpublic keyencryptioninformationprivacyforecastingincidenceresponseplanfirewallsocialengineeringwebfeedartificialintelligence(AI)expertsystemgoalseekingintelligentagentsneuralnetworkdashboardsinglesign-onwhat-ifanalysisriskmatrixportalethicsintellectualpropertykeyperformanceindicators(KPIs)optimizationphishingpredictiveanalyticsbotnetsstickinessutilitarianismmarketbasketanalysisonlineanalyticalprocessing(OLAP)CAPTCHAnaturallaws andrightsmashupclickstreamdatadigital rightsmanagement(DRM)encryptionproxy

Chapter 7, 10 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. text mining
  2. information security
  3. distributed denial of service (DDoS)
  4. malware
  5. multifactor authentication
  6. public key encryption
  7. information privacy
  8. forecasting
  9. incidence response plan
  10. firewall
  11. social engineering
  12. web feed
  13. artificial intelligence (AI)
  14. expert system
  15. goal seeking
  16. intelligent agents
  17. neural network
  18. dashboard
  19. single sign-on
  20. what-if analysis
  21. risk matrix
  22. portal
  23. ethics
  24. intellectual property
  25. key performance indicators (KPIs)
  26. optimization
  27. phishing
  28. predictive analytics
  29. botnets
  30. stickiness
  31. utilitarianism
  32. market basket analysis
  33. online analytical processing (OLAP)
  34. CAPTCHA
  35. natural laws and rights
  36. mashup
  37. clickstream data
  38. digital rights management (DRM)
  39. encryption
  40. proxy