screen saver anit- virus software "The Right to Be Forgotten" digital signature illicit server Authentication non- repudiation Firewall hash encryption digital certificate symmetric encryption Hash Transport Layer Security (TLS) Spyware Key Trojan Patch Decryption asymmetric encryption Secure Sockets Layer (SSL) Internet Control Messaging Protocol (ICMP) Malware Encryption Typosquatting screen saver anit- virus software "The Right to Be Forgotten" digital signature illicit server Authentication non- repudiation Firewall hash encryption digital certificate symmetric encryption Hash Transport Layer Security (TLS) Spyware Key Trojan Patch Decryption asymmetric encryption Secure Sockets Layer (SSL) Internet Control Messaging Protocol (ICMP) Malware Encryption Typosquatting
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
screen saver
anit-virus software
"The Right to Be Forgotten"
digital signature
illicit server
Authentication
non-repudiation
Firewall
hash encryption
digital certificate
symmetric encryption
Hash
Transport
Layer Security (TLS)
Spyware
Key
Trojan
Patch
Decryption
asymmetric encryption
Secure Sockets Layer (SSL)
Internet Control Messaging Protocol (ICMP)
Malware
Encryption
Typosquatting