anit-virussoftwarePatchMalwareEncryptionhashencryptionTransportLayerSecurity(TLS)TyposquattingDecryptionFirewallillicitservernon-repudiationTrojanSpywareasymmetricencryptionInternetControlMessagingProtocol(ICMP)AuthenticationKeyHashsymmetricencryptionscreensaverSecureSocketsLayer(SSL)digitalcertificate"TheRight toBeForgotten"digitalsignatureanit-virussoftwarePatchMalwareEncryptionhashencryptionTransportLayerSecurity(TLS)TyposquattingDecryptionFirewallillicitservernon-repudiationTrojanSpywareasymmetricencryptionInternetControlMessagingProtocol(ICMP)AuthenticationKeyHashsymmetricencryptionscreensaverSecureSocketsLayer(SSL)digitalcertificate"TheRight toBeForgotten"digitalsignature

IBA Lesson 8 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. anit-virus software
  2. Patch
  3. Malware
  4. Encryption
  5. hash encryption
  6. Transport Layer Security (TLS)
  7. Typosquatting
  8. Decryption
  9. Firewall
  10. illicit server
  11. non-repudiation
  12. Trojan
  13. Spyware
  14. asymmetric encryption
  15. Internet Control Messaging Protocol (ICMP)
  16. Authentication
  17. Key
  18. Hash
  19. symmetric encryption
  20. screen saver
  21. Secure Sockets Layer (SSL)
  22. digital certificate
  23. "The Right to Be Forgotten"
  24. digital signature