PhishingTerabyte(TB)AIDisruptiveTechnologyWi-FiDataCenterEncryptionCyberSecurityStorageCIOVPNSocialMediaStrategicWirelessCloudHackingSpamBandwidthNetworkDataVirtualizationInternetRansomwareInternetofThingsPhishingTerabyte(TB)AIDisruptiveTechnologyWi-FiDataCenterEncryptionCyberSecurityStorageCIOVPNSocialMediaStrategicWirelessCloudHackingSpamBandwidthNetworkDataVirtualizationInternetRansomwareInternetofThings

Connecting the Dots between IT and Organizations - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Phishing
  2. Terabyte (TB)
  3. AI
  4. Disruptive Technology
  5. Wi-Fi
  6. Data Center
  7. Encryption
  8. Cyber Security
  9. Storage
  10. CIO
  11. VPN
  12. Social Media
  13. Strategic
  14. Wireless
  15. Cloud
  16. Hacking
  17. Spam
  18. Bandwidth
  19. Network
  20. Data
  21. Virtualization
  22. Internet
  23. Ransomware
  24. Internet of Things