BandwidthStorageHackingPhishingStrategicVirtualizationCIODataDataCenterVPNNetworkSpamSocialMediaCyberSecurityWirelessInternetCloudInternetofThingsTerabyte(TB)RansomwareWi-FiAIDisruptiveTechnologyEncryptionBandwidthStorageHackingPhishingStrategicVirtualizationCIODataDataCenterVPNNetworkSpamSocialMediaCyberSecurityWirelessInternetCloudInternetofThingsTerabyte(TB)RansomwareWi-FiAIDisruptiveTechnologyEncryption

Connecting the Dots between IT and Organizations - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Bandwidth
  2. Storage
  3. Hacking
  4. Phishing
  5. Strategic
  6. Virtualization
  7. CIO
  8. Data
  9. Data Center
  10. VPN
  11. Network
  12. Spam
  13. Social Media
  14. Cyber Security
  15. Wireless
  16. Internet
  17. Cloud
  18. Internet of Things
  19. Terabyte (TB)
  20. Ransomware
  21. Wi-Fi
  22. AI
  23. Disruptive Technology
  24. Encryption